Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-9555 (GCVE-0-2016-9555)
Vulnerability from cvelistv5
Published
2016-11-28 03:01
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:38.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2016:3096", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "name": "SUSE-SU-2016:3206", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" }, { "name": "SUSE-SU-2016:3169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" }, { "name": "1037339", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037339" }, { "name": "SUSE-SU-2016:3117", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" }, { "name": "SUSE-SU-2016:3197", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk" }, { "name": "RHSA-2017:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html" }, { "name": "RHSA-2017:0113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html" }, { "name": "RHSA-2017:0091", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html" }, { "name": "94479", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94479" }, { "name": "SUSE-SU-2016:3247", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" }, { "name": "[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/22/18" }, { "name": "SUSE-SU-2016:3183", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "name": "SUSE-SU-2016:3116", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" }, { "name": "SUSE-SU-2016:3113", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" }, { "name": "RHSA-2017:0307", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html" }, { "name": "SUSE-SU-2016:3205", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SU-2016:3096", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "name": "SUSE-SU-2016:3206", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" }, { "name": "SUSE-SU-2016:3169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" }, { "name": "1037339", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037339" }, { "name": "SUSE-SU-2016:3117", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" }, { "name": "SUSE-SU-2016:3197", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk" }, { "name": "RHSA-2017:0086", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html" }, { "name": "RHSA-2017:0113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html" }, { "name": "RHSA-2017:0091", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html" }, { "name": "94479", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94479" }, { "name": "SUSE-SU-2016:3247", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" }, { "name": "[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/22/18" }, { "name": "SUSE-SU-2016:3183", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "name": "SUSE-SU-2016:3116", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" }, { "name": "SUSE-SU-2016:3113", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" }, { "name": "RHSA-2017:0307", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html" }, { "name": "SUSE-SU-2016:3205", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-9555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2016:3096", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa134", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "name": "SUSE-SU-2016:3206", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" }, { "name": "SUSE-SU-2016:3169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" }, { "name": "1037339", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037339" }, { "name": "SUSE-SU-2016:3117", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" }, { "name": "SUSE-SU-2016:3197", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" }, { "name": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "name": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk" }, { "name": "RHSA-2017:0086", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html" }, { "name": "RHSA-2017:0113", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html" }, { "name": "RHSA-2017:0091", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html" }, { "name": "94479", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94479" }, { "name": "SUSE-SU-2016:3247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" }, { "name": "[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/11/22/18" }, { "name": "SUSE-SU-2016:3183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "name": "SUSE-SU-2016:3116", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" }, { "name": "SUSE-SU-2016:3113", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" }, { "name": "RHSA-2017:0307", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html" }, { "name": "SUSE-SU-2016:3205", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-9555", "datePublished": "2016-11-28T03:01:00", "dateReserved": "2016-11-22T00:00:00", "dateUpdated": "2024-08-06T02:50:38.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-9555\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-11-28T03:59:17.097\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n sctp_sf_ootb en net/sctp/sm_statefuns.c en el kernel Linux en versiones anteriores a 4.8.8 carece de comprobaci\u00f3n de longitud de fragmento para el primer fragmento, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (acceso slab fuera de l\u00edmites) o tener otro posible impacto no especificado a trav\u00e9s de datos SCTP manipulados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.2\",\"versionEndExcluding\":\"3.2.85\",\"matchCriteriaId\":\"A779DD72-34BF-411B-A324-7D4E130B3F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"3.10.105\",\"matchCriteriaId\":\"2B846CBB-1438-4151-B9FC-816C9548110E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11\",\"versionEndExcluding\":\"3.12.68\",\"matchCriteriaId\":\"01D9DF52-357F-4FC6-927D-2A0D79CD9FBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.13\",\"versionEndExcluding\":\"3.16.40\",\"matchCriteriaId\":\"1331ABAB-8C2B-4379-BA77-B655A5B9A83F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"3.18.49\",\"matchCriteriaId\":\"5AA77834-089F-4556-A00B-CAC1E08444BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.4.32\",\"matchCriteriaId\":\"C13E615E-4863-48DF-9278-DDE45DDE751E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5.0\",\"versionEndExcluding\":\"4.8.8\",\"matchCriteriaId\":\"579D05A2-508B-4816-A1B8-575A1179620F\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0086.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0091.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0113.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0307.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/11/22/18\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94479\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037339\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa134\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1397930\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0086.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0091.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0113.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0307.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/11/22/18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037339\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa134\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1397930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2016:3197-1
Vulnerability from csaf_suse
Published
2016-12-20 11:23
Modified
2016-12-20 11:23
Summary
Security update for Linux Kernel Live Patch 15 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 15 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_54 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-SAP-12-2016-1855,SUSE-SLE-SERVER-12-2016-1855
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 15 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_54 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1855,SUSE-SLE-SERVER-12-2016-1855", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3197-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3197-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163197-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3197-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002499.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 15 for SLE 12", "tracking": { "current_release_date": "2016-12-20T11:23:18Z", "generator": { "date": "2016-12-20T11:23:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3197-1", "initial_release_date": "2016-12-20T11:23:18Z", "revision_history": [ { "date": "2016-12-20T11:23:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-20T11:23:18Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-20T11:23:18Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3119-1
Vulnerability from csaf_suse
Published
2016-12-13 13:29
Modified
2016-12-13 13:29
Summary
Security update for Linux Kernel Live Patch 11 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 11 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_39 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-SAP-12-2016-1814,SUSE-SLE-SERVER-12-2016-1814
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 11 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_39 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1814,SUSE-SLE-SERVER-12-2016-1814", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3119-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3119-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163119-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3119-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002484.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 11 for SLE 12", "tracking": { "current_release_date": "2016-12-13T13:29:01Z", "generator": { "date": "2016-12-13T13:29:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3119-1", "initial_release_date": "2016-12-13T13:29:01Z", "revision_history": [ { "date": "2016-12-13T13:29:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T13:29:01Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T13:29:01Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T13:29:01Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3112-1
Vulnerability from csaf_suse
Published
2016-12-13 11:50
Modified
2016-12-13 11:50
Summary
Security update for Linux Kernel Live Patch 12 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 12 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_42 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-SAP-12-2016-1807,SUSE-SLE-SERVER-12-2016-1807
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 12 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.55-52_42 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1807,SUSE-SLE-SERVER-12-2016-1807", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3112-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3112-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163112-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3112-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002479.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 12 for SLE 12", "tracking": { "current_release_date": "2016-12-13T11:50:28Z", "generator": { "date": "2016-12-13T11:50:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3112-1", "initial_release_date": "2016-12-13T11:50:28Z", "revision_history": [ { "date": "2016-12-13T11:50:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:50:28Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:50:28Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:50:28Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3169-1
Vulnerability from csaf_suse
Published
2016-12-15 22:16
Modified
2016-12-15 22:16
Summary
Security update for Linux Kernel Live Patch 0 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 0 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.21-69 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- A stability issue in the btrfs module was fixed (bsc#1008284)
Patchnames
SUSE-SLE-Live-Patching-12-2016-1834
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.21-69 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- A stability issue in the btrfs module was fixed (bsc#1008284)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1834", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3169-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3169-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163169-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3169-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002490.html" }, { "category": "self", "summary": "SUSE Bug 1008284", "url": "https://bugzilla.suse.com/1008284" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP2", "tracking": { "current_release_date": "2016-12-15T22:16:06Z", "generator": { "date": "2016-12-15T22:16:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3169-1", "initial_release_date": "2016-12-15T22:16:06Z", "revision_history": [ { "date": "2016-12-15T22:16:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_21-69-default-2-5.1.x86_64", "product": { "name": "kgraft-patch-4_4_21-69-default-2-5.1.x86_64", "product_id": "kgraft-patch-4_4_21-69-default-2-5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_21-69-default-2-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-2-5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_21-69-default-2-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-2-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-15T22:16:06Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-2-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-2-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-2-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-15T22:16:06Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2017:0407-1
Vulnerability from csaf_suse
Published
2017-02-06 14:41
Modified
2017-02-06 14:41
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 rt-kernel was updated to 3.12.69 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-8962: Fixed a double free vulnerability in the SCSI subsystem that allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) (bnc#1010501).
- CVE-2015-8963: Fixed a race condition in kernel/events/core.c that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010502).
- CVE-2015-8964: Fixed a bug in the tty_set_termios_ldisc function that allowed local users to obtain sensitive information from kernel memory (bnc#1010507).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1017710).
- CVE-2016-7910: Fixed a use-after-free vulnerability in the block subsystem that allowed local users to gain privileges (bnc#1010716).
- CVE-2016-7911: Fixed a race condition in the get_task_ioprio function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010711).
- CVE-2016-7913: Fixed a bug in the xc2028_set_config function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010478).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) (bnc#1010475).
- CVE-2016-8399: Fixed a bug in the kernel networking subsystem that could have enabled a local malicious application to execute arbitrary code within the context of the kernel. (bnc#1014746).
- CVE-2016-8632: The net subsystem did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) (bnc#1008831).
- CVE-2016-8633: The firewire subsystem allowed remote attackers to execute arbitrary code via crafted fragmented packets in certain unusual hardware configurations (bnc#1008833).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) (bnc#1009969).
- CVE-2016-8655: Fixed a race condition in the network subsystem that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1012754).
- CVE-2016-9083: The PCI subsystem local users to bypass integer overflow checks and cause a denial of service (memory corruption) or have unspecified other impact (bnc#1007197).
- CVE-2016-9084: The PCI subsystem misused the kzalloc() function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact (bnc#1007197).
- CVE-2016-9555: Fixed a bug in the network subsystem that allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-9576: The block subsystem did not properly restrict the type of iterator, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1013604).
- CVE-2016-9756: The kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory (bnc#1013038).
- CVE-2016-9793: The net subsystem mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact (bnc#1013531).
- CVE-2016-9794: Fixed a race condition in the ALSA subsystem that allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1013533).
- CVE-2016-9806: Fixed a race condition in the netlink_dump() function which could have allowed local users to cause a denial of service (double free) or possibly have unspecified other impact (bnc#1013540).
- CVE-2017-2583: kvm: x86: fixed emulation of 'MOV SS, null selector' (bsc#1020602).
- CVE-2017-2584: arch: x86: kvm: fixed a bug that could have allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) (bnc#1019851).
- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set setgid bits on files they don't down. (bsc#1021258, CVE-2017-5551).
The following non-security bugs were fixed:
- 8250_pci: Fix potential use-after-free in error path (bsc#1013001).
- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 bsc#922056).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#922052 bsc#922056).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).
- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).
- btrfs: Revert 'do not delay inode ref updates during log replay' (bsc#987192).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).
- btrfs: do not delay inode ref updates during log replay (bsc#987192).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).
- cpuset: fix sched_load_balance that was accidentally broken in a previous update (bsc#1010294).
- ext4: fix data exposure after a crash (bsc#1012985).
- fs/dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- fuse: do not use iocb after it may have been freed (bsc#1012985).
- hpilo: Add support for iLO5 (bsc#999101).
- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381 bsc#921338).
- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036).
- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727).
- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727).
- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Fix oops caused by missing queue pairing (bnc#857394).
- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).
- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).
- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963).
- kabi: protect __sk_mem_reclaim (kabi).
- kabi: protect struct perf_event_context (kabi).
- kabi: reintroduce sk_filter (kabi).
- kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727).
- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036).
- net/mlx5e: Do not modify CQ before it was created (bnc#923036).
- net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036).
- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036).
- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036).
- netback: correct array index (bsc#983348).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Fix 'NFS Lock reclaim failed' errors (bsc#1014410).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix_acl: Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus.
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- proc: avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).
- raid1: ignore discard error (bsc#1017164).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).
- sfc: clear napi_hash state when copying channels (bsc#923037).
- sfc: fix potential stack corruption from running past stat bitmask (bsc#923037).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).
- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#921778).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).
- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
Patchnames
SUSE-SLE-RT-12-SP1-2017-202
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 rt-kernel was updated to 3.12.69 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2015-8962: Fixed a double free vulnerability in the SCSI subsystem that allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) (bnc#1010501).\n- CVE-2015-8963: Fixed a race condition in kernel/events/core.c that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010502).\n- CVE-2015-8964: Fixed a bug in the tty_set_termios_ldisc function that allowed local users to obtain sensitive information from kernel memory (bnc#1010507).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1017710).\n- CVE-2016-7910: Fixed a use-after-free vulnerability in the block subsystem that allowed local users to gain privileges (bnc#1010716).\n- CVE-2016-7911: Fixed a race condition in the get_task_ioprio function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010711).\n- CVE-2016-7913: Fixed a bug in the xc2028_set_config function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010478).\n- CVE-2016-7914: The assoc_array_insert_into_terminal_node function did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) (bnc#1010475).\n- CVE-2016-8399: Fixed a bug in the kernel networking subsystem that could have enabled a local malicious application to execute arbitrary code within the context of the kernel. (bnc#1014746).\n- CVE-2016-8632: The net subsystem did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) (bnc#1008831).\n- CVE-2016-8633: The firewire subsystem allowed remote attackers to execute arbitrary code via crafted fragmented packets in certain unusual hardware configurations (bnc#1008833).\n- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) (bnc#1009969).\n- CVE-2016-8655: Fixed a race condition in the network subsystem that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1012754).\n- CVE-2016-9083: The PCI subsystem local users to bypass integer overflow checks and cause a denial of service (memory corruption) or have unspecified other impact (bnc#1007197).\n- CVE-2016-9084: The PCI subsystem misused the kzalloc() function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact (bnc#1007197).\n- CVE-2016-9555: Fixed a bug in the network subsystem that allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-9576: The block subsystem did not properly restrict the type of iterator, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1013604).\n- CVE-2016-9756: The kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory (bnc#1013038).\n- CVE-2016-9793: The net subsystem mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact (bnc#1013531).\n- CVE-2016-9794: Fixed a race condition in the ALSA subsystem that allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1013533).\n- CVE-2016-9806: Fixed a race condition in the netlink_dump() function which could have allowed local users to cause a denial of service (double free) or possibly have unspecified other impact (bnc#1013540).\n- CVE-2017-2583: kvm: x86: fixed emulation of \u0027MOV SS, null selector\u0027 (bsc#1020602).\n- CVE-2017-2584: arch: x86: kvm: fixed a bug that could have allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) (bnc#1019851).\n- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set setgid bits on files they don\u0027t down. (bsc#1021258, CVE-2017-5551).\n\nThe following non-security bugs were fixed:\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013001).\n- block_dev: do not test bdev-\u003ebd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 bsc#922056).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- bnx2x: fix lockdep splat (bsc#922052 bsc#922056).\n- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).\n- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).\n- btrfs: Revert \u0027do not delay inode ref updates during log replay\u0027 (bsc#987192).\n- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).\n- btrfs: do not delay inode ref updates during log replay (bsc#987192).\n- btrfs: fix incremental send failure caused by balance (bsc#985850).\n- btrfs: fix relocation incorrectly dropping data references (bsc#990384).\n- btrfs: increment ctx-\u003epos for every emitted or skipped dirent in readdir (bsc#981709).\n- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).\n- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).\n- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).\n- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).\n- cpuset: fix sched_load_balance that was accidentally broken in a previous update (bsc#1010294).\n- ext4: fix data exposure after a crash (bsc#1012985).\n- fs/dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- fuse: do not use iocb after it may have been freed (bsc#1012985).\n- hpilo: Add support for iLO5 (bsc#999101).\n- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381 bsc#921338).\n- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036).\n- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727).\n- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727).\n- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036).\n- ibmveth: calculate gso_segs for large packets (bsc#1019148).\n- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).\n- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).\n- ibmveth: set correct gso_size and gso_type (bsc#1019148).\n- igb: Fix oops caused by missing queue pairing (bnc#857394).\n- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).\n- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).\n- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963).\n- kabi: protect __sk_mem_reclaim (kabi).\n- kabi: protect struct perf_event_context (kabi).\n- kabi: reintroduce sk_filter (kabi).\n- kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).\n- kgr: ignore zombie tasks during the patching (bnc#1008979).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).\n- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727).\n- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036).\n- net/mlx5e: Do not modify CQ before it was created (bnc#923036).\n- net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036).\n- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036).\n- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036).\n- netback: correct array index (bsc#983348).\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Fix \u0027NFS Lock reclaim failed\u0027 errors (bsc#1014410).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- posix_acl: Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus.\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- proc: avoid including \u0027mountproto=\u0027 with no protocol in /proc/mounts (bsc#1019260).\n- raid1: ignore discard error (bsc#1017164).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)\n- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).\n- sfc: clear napi_hash state when copying channels (bsc#923037).\n- sfc: fix potential stack corruption from running past stat bitmask (bsc#923037).\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).\n- target: add XCOPY target/segment desc sense codes (bsc#991273).\n- target: bounds check XCOPY segment descriptor list (bsc#991273).\n- target: bounds check XCOPY total descriptor list length (bsc#991273).\n- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- target: check for XCOPY parameter truncation (bsc#991273).\n- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).\n- target: simplify XCOPY wwn-\u003ese_dev lookup helper (bsc#991273).\n- target: support XCOPY requests without parameters (bsc#991273).\n- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).\n- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#921778).\n- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).\n- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).\n- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).\n- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).\n- xfs: refactor xlog_recover_process_data() (bsc#1019300).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP1-2017-202", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0407-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0407-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170407-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0407-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" }, { "category": "self", "summary": "SUSE Bug 1003813", "url": "https://bugzilla.suse.com/1003813" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1007197", "url": "https://bugzilla.suse.com/1007197" }, { "category": "self", "summary": "SUSE Bug 1008557", "url": "https://bugzilla.suse.com/1008557" }, { "category": "self", "summary": "SUSE Bug 1008567", "url": "https://bugzilla.suse.com/1008567" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008876", "url": "https://bugzilla.suse.com/1008876" }, { "category": "self", "summary": "SUSE Bug 1008979", "url": "https://bugzilla.suse.com/1008979" }, { "category": "self", "summary": "SUSE Bug 1009062", "url": "https://bugzilla.suse.com/1009062" }, { "category": "self", "summary": "SUSE Bug 1009969", "url": "https://bugzilla.suse.com/1009969" }, { "category": "self", "summary": "SUSE Bug 1010040", "url": "https://bugzilla.suse.com/1010040" }, { "category": "self", "summary": "SUSE Bug 1010213", "url": "https://bugzilla.suse.com/1010213" }, { "category": "self", "summary": "SUSE Bug 1010294", "url": "https://bugzilla.suse.com/1010294" }, { "category": "self", "summary": "SUSE Bug 1010475", "url": "https://bugzilla.suse.com/1010475" }, { "category": "self", "summary": "SUSE Bug 1010478", "url": "https://bugzilla.suse.com/1010478" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010502", "url": "https://bugzilla.suse.com/1010502" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010612", "url": "https://bugzilla.suse.com/1010612" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1012060", "url": "https://bugzilla.suse.com/1012060" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012754", "url": "https://bugzilla.suse.com/1012754" }, { "category": "self", "summary": "SUSE Bug 1012917", "url": "https://bugzilla.suse.com/1012917" }, { "category": "self", "summary": "SUSE Bug 1012985", "url": "https://bugzilla.suse.com/1012985" }, { "category": "self", "summary": "SUSE Bug 1013001", "url": "https://bugzilla.suse.com/1013001" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013479", "url": "https://bugzilla.suse.com/1013479" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013533", "url": "https://bugzilla.suse.com/1013533" }, { "category": "self", "summary": "SUSE Bug 1013540", "url": "https://bugzilla.suse.com/1013540" }, { "category": "self", "summary": "SUSE Bug 1013604", "url": "https://bugzilla.suse.com/1013604" }, { "category": "self", "summary": "SUSE Bug 1014410", "url": "https://bugzilla.suse.com/1014410" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1016713", "url": "https://bugzilla.suse.com/1016713" }, { "category": "self", "summary": "SUSE Bug 1016725", "url": "https://bugzilla.suse.com/1016725" }, { "category": "self", "summary": "SUSE Bug 1016961", "url": "https://bugzilla.suse.com/1016961" }, { "category": "self", "summary": "SUSE Bug 1017164", "url": "https://bugzilla.suse.com/1017164" }, { "category": "self", "summary": "SUSE Bug 1017170", "url": "https://bugzilla.suse.com/1017170" }, { "category": "self", "summary": "SUSE Bug 1017410", "url": "https://bugzilla.suse.com/1017410" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1018100", "url": "https://bugzilla.suse.com/1018100" }, { "category": "self", "summary": "SUSE Bug 1019032", "url": "https://bugzilla.suse.com/1019032" }, { "category": "self", "summary": "SUSE Bug 1019148", "url": "https://bugzilla.suse.com/1019148" }, { "category": "self", "summary": "SUSE Bug 1019260", "url": "https://bugzilla.suse.com/1019260" }, { "category": "self", "summary": "SUSE Bug 1019300", "url": "https://bugzilla.suse.com/1019300" }, { "category": "self", "summary": "SUSE Bug 1019783", "url": "https://bugzilla.suse.com/1019783" }, { "category": "self", "summary": "SUSE Bug 1019851", "url": "https://bugzilla.suse.com/1019851" }, { "category": "self", "summary": "SUSE Bug 1020214", "url": "https://bugzilla.suse.com/1020214" }, { "category": "self", "summary": "SUSE Bug 1020602", "url": "https://bugzilla.suse.com/1020602" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 856380", "url": "https://bugzilla.suse.com/856380" }, { "category": "self", "summary": "SUSE Bug 857394", "url": "https://bugzilla.suse.com/857394" }, { "category": "self", "summary": "SUSE Bug 858727", "url": "https://bugzilla.suse.com/858727" }, { "category": "self", "summary": "SUSE Bug 921338", "url": "https://bugzilla.suse.com/921338" }, { "category": "self", "summary": "SUSE Bug 921778", "url": "https://bugzilla.suse.com/921778" }, { "category": "self", "summary": "SUSE Bug 922052", "url": "https://bugzilla.suse.com/922052" }, { "category": "self", "summary": "SUSE Bug 922056", "url": "https://bugzilla.suse.com/922056" }, { "category": "self", "summary": "SUSE Bug 923036", "url": "https://bugzilla.suse.com/923036" }, { "category": "self", "summary": "SUSE Bug 923037", "url": "https://bugzilla.suse.com/923037" }, { "category": "self", "summary": "SUSE Bug 924381", "url": "https://bugzilla.suse.com/924381" }, { "category": "self", "summary": "SUSE Bug 938963", "url": "https://bugzilla.suse.com/938963" }, { "category": "self", "summary": "SUSE Bug 972993", "url": "https://bugzilla.suse.com/972993" }, { "category": "self", "summary": "SUSE Bug 980560", "url": "https://bugzilla.suse.com/980560" }, { "category": "self", "summary": "SUSE Bug 981709", "url": "https://bugzilla.suse.com/981709" }, { "category": "self", "summary": "SUSE Bug 983087", "url": "https://bugzilla.suse.com/983087" }, { "category": "self", "summary": "SUSE Bug 983348", "url": "https://bugzilla.suse.com/983348" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 985850", "url": "https://bugzilla.suse.com/985850" }, { "category": "self", "summary": "SUSE Bug 987192", "url": "https://bugzilla.suse.com/987192" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 990384", "url": "https://bugzilla.suse.com/990384" }, { "category": "self", "summary": "SUSE Bug 991273", "url": "https://bugzilla.suse.com/991273" }, { "category": "self", "summary": "SUSE Bug 993739", "url": "https://bugzilla.suse.com/993739" }, { "category": "self", "summary": "SUSE Bug 997807", "url": "https://bugzilla.suse.com/997807" }, { "category": "self", "summary": "SUSE Bug 999101", "url": "https://bugzilla.suse.com/999101" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8963 page", "url": "https://www.suse.com/security/cve/CVE-2015-8963/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7914 page", "url": "https://www.suse.com/security/cve/CVE-2016-7914/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8645 page", "url": "https://www.suse.com/security/cve/CVE-2016-8645/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9083 page", "url": "https://www.suse.com/security/cve/CVE-2016-9083/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9084 page", "url": "https://www.suse.com/security/cve/CVE-2016-9084/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9576 page", "url": "https://www.suse.com/security/cve/CVE-2016-9576/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9794 page", "url": "https://www.suse.com/security/cve/CVE-2016-9794/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9806 page", "url": "https://www.suse.com/security/cve/CVE-2016-9806/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2583 page", "url": "https://www.suse.com/security/cve/CVE-2017-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2584 page", "url": "https://www.suse.com/security/cve/CVE-2017-2584/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-06T14:41:53Z", "generator": { "date": "2017-02-06T14:41:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0407-1", "initial_release_date": "2017-02-06T14:41:53Z", "revision_history": [ { "date": "2017-02-06T14:41:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-3.12.69-60.30.1.noarch", "product": { "name": "kernel-devel-rt-3.12.69-60.30.1.noarch", "product_id": "kernel-devel-rt-3.12.69-60.30.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-3.12.69-60.30.1.noarch", "product": { "name": "kernel-source-rt-3.12.69-60.30.1.noarch", "product_id": "kernel-source-rt-3.12.69-60.30.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-compute-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-compute-3.12.69-60.30.1.x86_64", "product_id": "kernel-compute-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-base-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-compute-base-3.12.69-60.30.1.x86_64", "product_id": "kernel-compute-base-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-devel-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-compute-devel-3.12.69-60.30.1.x86_64", "product_id": "kernel-compute-devel-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "product_id": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-rt-3.12.69-60.30.1.x86_64", "product_id": "kernel-rt-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-rt-base-3.12.69-60.30.1.x86_64", "product_id": "kernel-rt-base-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-rt-devel-3.12.69-60.30.1.x86_64", "product_id": "kernel-rt-devel-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "product_id": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-syms-rt-3.12.69-60.30.1.x86_64", "product_id": "kernel-syms-rt-3.12.69-60.30.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP1", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-compute-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-base-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-compute-base-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-devel-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-compute-devel-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-3.12.69-60.30.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch" }, "product_reference": "kernel-devel-rt-3.12.69-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-rt-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-rt-base-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-rt-devel-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.12.69-60.30.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch" }, "product_reference": "kernel-source-rt-3.12.69-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-syms-rt-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8963" } ], "notes": [ { "category": "general", "text": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8963", "url": "https://www.suse.com/security/cve/CVE-2015-8963" }, { "category": "external", "summary": "SUSE Bug 1010502 for CVE-2015-8963", "url": "https://bugzilla.suse.com/1010502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2015-8963" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-7914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7914" } ], "notes": [ { "category": "general", "text": "The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7914", "url": "https://www.suse.com/security/cve/CVE-2016-7914" }, { "category": "external", "summary": "SUSE Bug 1010475 for CVE-2016-7914", "url": "https://bugzilla.suse.com/1010475" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-7914" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8645" } ], "notes": [ { "category": "general", "text": "The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8645", "url": "https://www.suse.com/security/cve/CVE-2016-8645" }, { "category": "external", "summary": "SUSE Bug 1009969 for CVE-2016-8645", "url": "https://bugzilla.suse.com/1009969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8645" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9083" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \"state machine confusion bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9083", "url": "https://www.suse.com/security/cve/CVE-2016-9083" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9083", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "low" } ], "title": "CVE-2016-9083" }, { "cve": "CVE-2016-9084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9084" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9084", "url": "https://www.suse.com/security/cve/CVE-2016-9084" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9084", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "low" } ], "title": "CVE-2016-9084" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9576" } ], "notes": [ { "category": "general", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9576", "url": "https://www.suse.com/security/cve/CVE-2016-9576" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1019668 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019668" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-9576" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2016-9794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9794" } ], "notes": [ { "category": "general", "text": "Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9794", "url": "https://www.suse.com/security/cve/CVE-2016-9794" }, { "category": "external", "summary": "SUSE Bug 1013533 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013533" }, { "category": "external", "summary": "SUSE Bug 1013543 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013543" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013604" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-9794" }, { "cve": "CVE-2016-9806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9806" } ], "notes": [ { "category": "general", "text": "Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9806", "url": "https://www.suse.com/security/cve/CVE-2016-9806" }, { "category": "external", "summary": "SUSE Bug 1013540 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1013540" }, { "category": "external", "summary": "SUSE Bug 1017589 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1017589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-9806" }, { "cve": "CVE-2017-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2583" } ], "notes": [ { "category": "general", "text": "The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2583", "url": "https://www.suse.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "SUSE Bug 1020602 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1020602" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2017-2583" }, { "cve": "CVE-2017-2584", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2584" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2584", "url": "https://www.suse.com/security/cve/CVE-2017-2584" }, { "category": "external", "summary": "SUSE Bug 1019851 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1019851" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2017-2584" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:3096-1
Vulnerability from csaf_suse
Published
2016-12-12 15:05
Modified
2016-12-12 15:05
Summary
Security update for Linux Kernel Live Patch 6 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 6 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.59-60_45 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1802
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 6 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.59-60_45 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1802", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3096-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3096-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163096-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3096-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002470.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 6 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-12T15:05:33Z", "generator": { "date": "2016-12-12T15:05:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3096-1", "initial_release_date": "2016-12-12T15:05:33Z", "revision_history": [ { "date": "2016-12-12T15:05:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T15:05:33Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T15:05:33Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3093-1
Vulnerability from csaf_suse
Published
2016-12-12 14:51
Modified
2016-12-12 14:51
Summary
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_25 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1799
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-60_25 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1799", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3093-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3093-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163093-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3093-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002468.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-12T14:51:42Z", "generator": { "date": "2016-12-12T14:51:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3093-1", "initial_release_date": "2016-12-12T14:51:42Z", "revision_history": [ { "date": "2016-12-12T14:51:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:42Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:42Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:42Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2017:0437-1
Vulnerability from csaf_suse
Published
2017-02-09 15:37
Modified
2017-02-09 15:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations
or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device
NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers
and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST
packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr
operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial
of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove
a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or
cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability
(bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local
malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
because it first requires compromising a privileged process and current compiler optimizations restrict access to the
vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain
error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted
application (bnc#1013038).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users
to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel
allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching
a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking
for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or
possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel
allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the
corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local
users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call
(bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of
service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users
to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users
to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time
interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a
denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero
bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote
attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
The following non-security bugs were fixed:
- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- KABI fix (bsc#1014410).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106 (bsc#913387).
- dm: do not call dm_sync_table() when creating new devices (bnc#901809).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- ibmveth: calculate gso_segs for large packets (bsc#1019165).
- ibmveth: set correct gso_size and gso_type (bsc#1019165).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).
- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).
- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).
- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- libata: introduce ata_host->n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).
- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).
- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).
- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).
- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).
- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).
- netfront: do not truncate grant references.
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).
- scsi: Fix erratic device offline during EH (bsc#993832).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Fix temperature reporting (bnc#790588 FATE#313912).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- xenbus: do not invoke is_ready() for most device states (bsc#987333).
Patchnames
sdksp4-kernel-12977,slessp4-kernel-12977,slexsp3-kernel-12977
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations\n where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations\n or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device\n NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers\n and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST\n packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr\n operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial\n of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove\n a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship\n between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or\n cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability\n (bnc#1008831).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local\n malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate\n because it first requires compromising a privileged process and current compiler optimizations restrict access to the\n vulnerable code. (bnc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of\n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of\n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain\n error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted\n application (bnc#1013038).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users\n to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel\n allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching\n a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking\n for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or\n possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel\n allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the\n corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local\n users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call\n (bnc#1010711).\n- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of\n service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users\n to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users\n to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time\n interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a\n denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero\n bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote\n attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n\nThe following non-security bugs were fixed:\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).\n- KABI fix (bsc#1014410).\n- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).\n- be2net: Do not leak iomapped memory on removal (bug#925065).\n- block_dev: do not test bdev-\u003ebd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- crypto: add ghash-generic in the supported.conf(bsc#1016824)\n- crypto: aesni - Add support for 192 \u0026 256 bit keys to AESNI RFC4106 (bsc#913387).\n- dm: do not call dm_sync_table() when creating new devices (bnc#901809).\n- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)\n- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).\n- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).\n- ext4: fix reference counting bug on block allocation error (bsc#1013018).\n- futex: Acknowledge a new waiter in counter before plist (bsc#851603).\n- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).\n- hpilo: Add support for iLO5 (bsc#999101).\n- ibmveth: calculate gso_segs for large packets (bsc#1019165).\n- ibmveth: set correct gso_size and gso_type (bsc#1019165).\n- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).\n- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).\n- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).\n- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).\n- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).\n- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).\n- kexec: add a kexec_crash_loaded() function (bsc#973691).\n- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).\n- kvm: Distangle eventfd code from irqchip (bsc#989680).\n- kvm: Iterate over only vcpus that are preempted (bsc#989680).\n- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).\n- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).\n- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).\n- kvm: make processes waiting on vcpu mutex killable (bsc#989680).\n- kvm: nVMX: Add preemption timer support (bsc#989680).\n- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).\n- kvm: use symbolic constant for nr interrupts (bsc#989680).\n- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).\n- kvm: x86: Run PIT work in own kthread (bsc#989680).\n- kvm: x86: limit difference between kvmclock updates (bsc#989680).\n- libata: introduce ata_host-\u003en_tags to avoid oops on SAS controllers (bsc#871728).\n- libata: remove n_tags to avoid kABI breakage (bsc#871728).\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: Update rport reference counting (bsc#953233).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).\n- memstick: mspro_block: add missing curly braces (bsc#1016688).\n- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).\n- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).\n- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).\n- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).\n- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).\n- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).\n- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).\n- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).\n- mm: fix crashes from mbind() merging vmas (bnc#1005877).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).\n- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).\n- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).\n- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).\n- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).\n- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).\n- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).\n- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).\n- net/mlx4_core: Implement pci_resume callback (bsc#924708).\n- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).\n- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).\n- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).\n- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).\n- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).\n- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).\n- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).\n- netfront: do not truncate grant references.\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).\n- nvme: Automatic namespace rescan (bsc#1017686).\n- nvme: Metadata format support (bsc#1017686).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).\n- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).\n- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).\n- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- powerpc: fix typo \u0027CONFIG_PPC_CPU\u0027 (bsc#1010201).\n- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).\n- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).\n- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).\n- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).\n- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).\n- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).\n- scsi: Fix erratic device offline during EH (bsc#993832).\n- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).\n- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832).\n- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).\n- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).\n- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).\n- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).\n- tg3: Fix temperature reporting (bnc#790588 FATE#313912).\n- usb: console: fix potential use after free (bsc#1015817).\n- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).\n- usb: cp210x: Corrected USB request type definitions (bsc#1015932).\n- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).\n- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).\n- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).\n- usb: ipaq.c: fix a timeout loop (bsc#1015848).\n- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).\n- usb: option: fix runtime PM handling (bsc#1015752).\n- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).\n- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).\n- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).\n- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).\n- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).\n- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).\n- usb: sierra: fix AA deadlock in open error path (bsc#1015561).\n- usb: sierra: fix remote wakeup (bsc#1015561).\n- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).\n- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).\n- usb: sierra: fix use after free at suspend/resume (bsc#1015561).\n- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).\n- usb: usb_wwan: fix race between write and resume (bsc#1015760).\n- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).\n- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).\n- usb: usb_wwan: fix write and suspend race (bsc#1015760).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).\n- xenbus: do not invoke is_ready() for most device states (bsc#987333).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-12977,slessp4-kernel-12977,slexsp3-kernel-12977", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0437-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0437-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0437-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" }, { "category": "self", "summary": "SUSE Bug 1003813", "url": "https://bugzilla.suse.com/1003813" }, { "category": "self", "summary": "SUSE Bug 1005877", "url": "https://bugzilla.suse.com/1005877" }, { "category": "self", "summary": "SUSE Bug 1007615", "url": "https://bugzilla.suse.com/1007615" }, { "category": "self", "summary": "SUSE Bug 1008557", "url": "https://bugzilla.suse.com/1008557" }, { "category": "self", "summary": "SUSE Bug 1008645", "url": "https://bugzilla.suse.com/1008645" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008893", "url": "https://bugzilla.suse.com/1008893" }, { "category": "self", "summary": "SUSE Bug 1009875", "url": "https://bugzilla.suse.com/1009875" }, { "category": "self", "summary": "SUSE Bug 1010150", "url": "https://bugzilla.suse.com/1010150" }, { "category": "self", "summary": "SUSE Bug 1010175", "url": "https://bugzilla.suse.com/1010175" }, { "category": "self", "summary": "SUSE Bug 1010201", "url": "https://bugzilla.suse.com/1010201" }, { "category": "self", "summary": "SUSE Bug 1010467", "url": "https://bugzilla.suse.com/1010467" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010713", "url": "https://bugzilla.suse.com/1010713" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1011820", "url": "https://bugzilla.suse.com/1011820" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012411", "url": "https://bugzilla.suse.com/1012411" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012832", "url": "https://bugzilla.suse.com/1012832" }, { "category": "self", "summary": "SUSE Bug 1012851", "url": "https://bugzilla.suse.com/1012851" }, { "category": "self", "summary": "SUSE Bug 1012852", "url": "https://bugzilla.suse.com/1012852" }, { "category": "self", "summary": "SUSE Bug 1012917", "url": "https://bugzilla.suse.com/1012917" }, { "category": "self", "summary": "SUSE Bug 1013018", "url": "https://bugzilla.suse.com/1013018" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013042", "url": "https://bugzilla.suse.com/1013042" }, { "category": "self", "summary": "SUSE Bug 1013070", "url": "https://bugzilla.suse.com/1013070" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014410", "url": "https://bugzilla.suse.com/1014410" }, { "category": "self", "summary": "SUSE Bug 1014454", "url": "https://bugzilla.suse.com/1014454" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1015561", "url": "https://bugzilla.suse.com/1015561" }, { "category": "self", "summary": "SUSE Bug 1015752", "url": "https://bugzilla.suse.com/1015752" }, { "category": "self", "summary": "SUSE Bug 1015760", "url": "https://bugzilla.suse.com/1015760" }, { "category": "self", "summary": "SUSE Bug 1015796", "url": "https://bugzilla.suse.com/1015796" }, { "category": "self", "summary": "SUSE Bug 1015803", "url": "https://bugzilla.suse.com/1015803" }, { "category": "self", "summary": "SUSE Bug 1015817", "url": "https://bugzilla.suse.com/1015817" }, { "category": "self", "summary": "SUSE Bug 1015828", "url": "https://bugzilla.suse.com/1015828" }, { "category": "self", "summary": "SUSE Bug 1015844", "url": "https://bugzilla.suse.com/1015844" }, { "category": "self", "summary": "SUSE Bug 1015848", "url": "https://bugzilla.suse.com/1015848" }, { "category": "self", "summary": "SUSE Bug 1015878", "url": "https://bugzilla.suse.com/1015878" }, { "category": "self", "summary": "SUSE Bug 1015932", "url": "https://bugzilla.suse.com/1015932" }, { "category": "self", "summary": "SUSE Bug 1016320", "url": "https://bugzilla.suse.com/1016320" }, { "category": "self", "summary": "SUSE Bug 1016505", "url": "https://bugzilla.suse.com/1016505" }, { "category": "self", "summary": "SUSE Bug 1016520", "url": "https://bugzilla.suse.com/1016520" }, { "category": "self", "summary": "SUSE Bug 1016668", "url": "https://bugzilla.suse.com/1016668" }, { "category": "self", "summary": "SUSE Bug 1016688", "url": "https://bugzilla.suse.com/1016688" }, { "category": "self", "summary": "SUSE Bug 1016824", "url": "https://bugzilla.suse.com/1016824" }, { "category": "self", "summary": "SUSE Bug 1016831", "url": "https://bugzilla.suse.com/1016831" }, { "category": "self", "summary": "SUSE Bug 1017686", "url": "https://bugzilla.suse.com/1017686" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1019079", "url": "https://bugzilla.suse.com/1019079" }, { "category": "self", "summary": "SUSE Bug 1019148", "url": "https://bugzilla.suse.com/1019148" }, { "category": "self", "summary": "SUSE Bug 1019165", "url": "https://bugzilla.suse.com/1019165" }, { "category": "self", "summary": "SUSE Bug 1019348", "url": "https://bugzilla.suse.com/1019348" }, { "category": "self", "summary": "SUSE Bug 1019783", "url": "https://bugzilla.suse.com/1019783" }, { "category": "self", "summary": "SUSE Bug 1020214", "url": "https://bugzilla.suse.com/1020214" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 748806", "url": "https://bugzilla.suse.com/748806" }, { "category": "self", "summary": "SUSE Bug 786036", "url": "https://bugzilla.suse.com/786036" }, { "category": "self", "summary": "SUSE Bug 790588", "url": "https://bugzilla.suse.com/790588" }, { "category": "self", "summary": "SUSE Bug 795297", "url": "https://bugzilla.suse.com/795297" }, { "category": "self", "summary": "SUSE Bug 800999", "url": "https://bugzilla.suse.com/800999" }, { "category": "self", "summary": "SUSE Bug 821612", "url": "https://bugzilla.suse.com/821612" }, { "category": "self", "summary": "SUSE Bug 824171", "url": "https://bugzilla.suse.com/824171" }, { "category": "self", "summary": "SUSE Bug 851603", "url": "https://bugzilla.suse.com/851603" }, { "category": "self", "summary": "SUSE Bug 853052", "url": "https://bugzilla.suse.com/853052" }, { "category": "self", "summary": "SUSE Bug 871728", "url": "https://bugzilla.suse.com/871728" }, { "category": "self", "summary": "SUSE Bug 901809", "url": "https://bugzilla.suse.com/901809" }, { "category": "self", "summary": "SUSE Bug 909350", "url": "https://bugzilla.suse.com/909350" }, { "category": "self", "summary": "SUSE Bug 909491", "url": "https://bugzilla.suse.com/909491" }, { "category": "self", "summary": "SUSE Bug 913387", "url": "https://bugzilla.suse.com/913387" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 919382", "url": "https://bugzilla.suse.com/919382" }, { "category": "self", "summary": "SUSE Bug 924708", "url": "https://bugzilla.suse.com/924708" }, { "category": "self", "summary": "SUSE Bug 925065", "url": "https://bugzilla.suse.com/925065" }, { "category": "self", "summary": "SUSE Bug 953233", "url": "https://bugzilla.suse.com/953233" }, { "category": "self", "summary": "SUSE Bug 961589", "url": "https://bugzilla.suse.com/961589" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 969340", "url": "https://bugzilla.suse.com/969340" }, { "category": "self", "summary": "SUSE Bug 973691", "url": "https://bugzilla.suse.com/973691" }, { "category": "self", "summary": "SUSE Bug 987333", "url": "https://bugzilla.suse.com/987333" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989680", "url": "https://bugzilla.suse.com/989680" }, { "category": "self", "summary": "SUSE Bug 989896", "url": "https://bugzilla.suse.com/989896" }, { "category": "self", "summary": "SUSE Bug 990245", "url": "https://bugzilla.suse.com/990245" }, { "category": "self", "summary": "SUSE Bug 992991", "url": "https://bugzilla.suse.com/992991" }, { "category": "self", "summary": "SUSE Bug 993739", "url": "https://bugzilla.suse.com/993739" }, { "category": "self", "summary": "SUSE Bug 993832", "url": "https://bugzilla.suse.com/993832" }, { "category": "self", "summary": "SUSE Bug 996541", "url": "https://bugzilla.suse.com/996541" }, { "category": "self", "summary": "SUSE Bug 996557", "url": "https://bugzilla.suse.com/996557" }, { "category": "self", "summary": "SUSE Bug 997401", "url": "https://bugzilla.suse.com/997401" }, { "category": "self", "summary": "SUSE Bug 999101", "url": "https://bugzilla.suse.com/999101" }, { "category": "self", "summary": "SUSE CVE CVE-2004-0230 page", "url": "https://www.suse.com/security/cve/CVE-2004-0230/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6704 page", "url": "https://www.suse.com/security/cve/CVE-2012-6704/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6368 page", "url": "https://www.suse.com/security/cve/CVE-2013-6368/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7916 page", "url": "https://www.suse.com/security/cve/CVE-2016-7916/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8646 page", "url": "https://www.suse.com/security/cve/CVE-2016-8646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9685 page", "url": "https://www.suse.com/security/cve/CVE-2016-9685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-09T15:37:43Z", "generator": { "date": "2017-02-09T15:37:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0437-1", "initial_release_date": "2017-02-09T15:37:43Z", "revision_history": [ { "date": "2017-02-09T15:37:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-94.1.i586", "product": { "name": "kernel-default-3.0.101-94.1.i586", "product_id": "kernel-default-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.i586", "product": { "name": "kernel-default-base-3.0.101-94.1.i586", "product_id": "kernel-default-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.i586", "product": { "name": "kernel-default-devel-3.0.101-94.1.i586", "product_id": "kernel-default-devel-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-94.1.i586", "product": { "name": "kernel-ec2-3.0.101-94.1.i586", "product_id": "kernel-ec2-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-94.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-94.1.i586", "product_id": "kernel-ec2-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-94.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-94.1.i586", "product_id": "kernel-ec2-devel-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-94.1.i586", "product": { "name": "kernel-pae-3.0.101-94.1.i586", "product_id": "kernel-pae-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-94.1.i586", "product": { "name": "kernel-pae-base-3.0.101-94.1.i586", "product_id": "kernel-pae-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-94.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-94.1.i586", "product_id": "kernel-pae-devel-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.i586", "product": { "name": "kernel-source-3.0.101-94.1.i586", "product_id": "kernel-source-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.i586", "product": { "name": "kernel-syms-3.0.101-94.1.i586", "product_id": "kernel-syms-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.i586", "product": { "name": "kernel-trace-3.0.101-94.1.i586", "product_id": "kernel-trace-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.i586", "product": { "name": "kernel-trace-base-3.0.101-94.1.i586", "product_id": "kernel-trace-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-94.1.i586", "product_id": "kernel-trace-devel-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-94.1.i586", "product": { "name": "kernel-xen-3.0.101-94.1.i586", "product_id": "kernel-xen-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-94.1.i586", "product": { "name": "kernel-xen-base-3.0.101-94.1.i586", "product_id": "kernel-xen-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-94.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-94.1.i586", "product_id": "kernel-xen-devel-3.0.101-94.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-94.1.ia64", "product": { "name": "kernel-default-3.0.101-94.1.ia64", "product_id": "kernel-default-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.ia64", "product": { "name": "kernel-default-base-3.0.101-94.1.ia64", "product_id": "kernel-default-base-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-94.1.ia64", "product_id": "kernel-default-devel-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.ia64", "product": { "name": "kernel-source-3.0.101-94.1.ia64", "product_id": "kernel-source-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.ia64", "product": { "name": "kernel-syms-3.0.101-94.1.ia64", "product_id": "kernel-syms-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.ia64", "product": { "name": "kernel-trace-3.0.101-94.1.ia64", "product_id": "kernel-trace-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-94.1.ia64", "product_id": "kernel-trace-base-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-94.1.ia64", "product_id": "kernel-trace-devel-3.0.101-94.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-94.2.noarch", "product": { "name": "kernel-docs-3.0.101-94.2.noarch", "product_id": "kernel-docs-3.0.101-94.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-94.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-94.1.ppc64", "product_id": "kernel-bigmem-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-94.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-94.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-94.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-94.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-94.1.ppc64", "product": { "name": "kernel-default-3.0.101-94.1.ppc64", "product_id": "kernel-default-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-94.1.ppc64", "product_id": "kernel-default-base-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-94.1.ppc64", "product_id": "kernel-default-devel-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-94.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-94.1.ppc64", "product_id": "kernel-ppc64-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-94.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-94.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-94.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-94.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.ppc64", "product": { "name": "kernel-source-3.0.101-94.1.ppc64", "product_id": "kernel-source-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.ppc64", "product": { "name": "kernel-syms-3.0.101-94.1.ppc64", "product_id": "kernel-syms-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.ppc64", "product": { "name": "kernel-trace-3.0.101-94.1.ppc64", "product_id": "kernel-trace-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-94.1.ppc64", "product_id": "kernel-trace-base-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-94.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-94.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-94.1.s390x", "product": { "name": "kernel-default-3.0.101-94.1.s390x", "product_id": "kernel-default-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.s390x", "product": { "name": "kernel-default-base-3.0.101-94.1.s390x", "product_id": "kernel-default-base-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-94.1.s390x", "product_id": "kernel-default-devel-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-94.1.s390x", "product": { "name": "kernel-default-man-3.0.101-94.1.s390x", "product_id": "kernel-default-man-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.s390x", "product": { "name": "kernel-source-3.0.101-94.1.s390x", "product_id": "kernel-source-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.s390x", "product": { "name": "kernel-syms-3.0.101-94.1.s390x", "product_id": "kernel-syms-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.s390x", "product": { "name": "kernel-trace-3.0.101-94.1.s390x", "product_id": "kernel-trace-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-94.1.s390x", "product_id": "kernel-trace-base-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-94.1.s390x", "product_id": "kernel-trace-devel-3.0.101-94.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-94.1.x86_64", "product": { "name": "kernel-default-3.0.101-94.1.x86_64", "product_id": "kernel-default-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-94.1.x86_64", "product_id": "kernel-default-base-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-94.1.x86_64", "product_id": "kernel-default-devel-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-94.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-94.1.x86_64", "product_id": "kernel-ec2-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-94.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-94.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-94.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-94.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.x86_64", "product": { "name": "kernel-source-3.0.101-94.1.x86_64", "product_id": "kernel-source-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.x86_64", "product": { "name": "kernel-syms-3.0.101-94.1.x86_64", "product_id": "kernel-syms-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.x86_64", "product": { "name": "kernel-trace-3.0.101-94.1.x86_64", "product_id": "kernel-trace-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-94.1.x86_64", "product_id": "kernel-trace-base-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-94.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-94.1.x86_64", "product": { "name": "kernel-xen-3.0.101-94.1.x86_64", "product_id": "kernel-xen-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-94.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-94.1.x86_64", "product_id": "kernel-xen-base-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-94.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-94.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-94.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-94.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" }, "product_reference": "kernel-docs-3.0.101-94.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586" }, "product_reference": "kernel-default-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586" }, "product_reference": "kernel-default-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586" }, "product_reference": "kernel-source-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64" }, "product_reference": "kernel-source-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64" }, "product_reference": "kernel-source-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x" }, "product_reference": "kernel-source-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64" }, "product_reference": "kernel-source-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586" }, "product_reference": "kernel-syms-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64" }, "product_reference": "kernel-syms-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x" }, "product_reference": "kernel-syms-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586" }, "product_reference": "kernel-default-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586" }, "product_reference": "kernel-default-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586" }, "product_reference": "kernel-source-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64" }, "product_reference": "kernel-source-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64" }, "product_reference": "kernel-source-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x" }, "product_reference": "kernel-source-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64" }, "product_reference": "kernel-source-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586" }, "product_reference": "kernel-syms-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64" }, "product_reference": "kernel-syms-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x" }, "product_reference": "kernel-syms-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-0230" } ], "notes": [ { "category": "general", "text": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2004-0230", "url": "https://www.suse.com/security/cve/CVE-2004-0230" }, { "category": "external", "summary": "SUSE Bug 1184394 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1184394" }, { "category": "external", "summary": "SUSE Bug 1198501 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1198501" }, { "category": "external", "summary": "SUSE Bug 1206598 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1206598" }, { "category": "external", "summary": "SUSE Bug 969340 for CVE-2004-0230", "url": "https://bugzilla.suse.com/969340" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2004-0230", "url": "https://bugzilla.suse.com/989152" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2004-0230", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "low" } ], "title": "CVE-2004-0230" }, { "cve": "CVE-2012-6704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6704" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6704", "url": "https://www.suse.com/security/cve/CVE-2012-6704" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2012-6704" }, { "cve": "CVE-2013-6368", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6368" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6368", "url": "https://www.suse.com/security/cve/CVE-2013-6368" }, { "category": "external", "summary": "SUSE Bug 853052 for CVE-2013-6368", "url": "https://bugzilla.suse.com/853052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2013-6368" }, { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7916" } ], "notes": [ { "category": "general", "text": "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7916", "url": "https://www.suse.com/security/cve/CVE-2016-7916" }, { "category": "external", "summary": "SUSE Bug 1010467 for CVE-2016-7916", "url": "https://bugzilla.suse.com/1010467" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-7916" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8646" } ], "notes": [ { "category": "general", "text": "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8646", "url": "https://www.suse.com/security/cve/CVE-2016-8646" }, { "category": "external", "summary": "SUSE Bug 1010150 for CVE-2016-8646", "url": "https://bugzilla.suse.com/1010150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-8646" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9685" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9685", "url": "https://www.suse.com/security/cve/CVE-2016-9685" }, { "category": "external", "summary": "SUSE Bug 1012832 for CVE-2016-9685", "url": "https://bugzilla.suse.com/1012832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "low" } ], "title": "CVE-2016-9685" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:3117-1
Vulnerability from csaf_suse
Published
2016-12-13 12:33
Modified
2016-12-13 12:33
Summary
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.59-60_41 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1812
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.59-60_41 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1812", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3117-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3117-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163117-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3117-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002483.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-13T12:33:02Z", "generator": { "date": "2016-12-13T12:33:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3117-1", "initial_release_date": "2016-12-13T12:33:02Z", "revision_history": [ { "date": "2016-12-13T12:33:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T12:33:02Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T12:33:02Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3104-1
Vulnerability from csaf_suse
Published
2016-12-12 15:05
Modified
2016-12-12 15:05
Summary
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.57-60_35 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1801
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.57-60_35 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1801", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3104-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3104-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163104-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3104-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002473.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-12T15:05:13Z", "generator": { "date": "2016-12-12T15:05:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3104-1", "initial_release_date": "2016-12-12T15:05:13Z", "revision_history": [ { "date": "2016-12-12T15:05:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T15:05:13Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T15:05:13Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T15:05:13Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3247-1
Vulnerability from csaf_suse
Published
2016-12-22 13:32
Modified
2016-12-22 13:32
Summary
Security update for Linux Kernel Live Patch 16 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 16 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_57 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-SAP-12-2016-1892,SUSE-SLE-SERVER-12-2016-1892
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 16 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_57 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1892,SUSE-SLE-SERVER-12-2016-1892", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3247-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3247-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163247-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3247-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002514.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 16 for SLE 12", "tracking": { "current_release_date": "2016-12-22T13:32:10Z", "generator": { "date": "2016-12-22T13:32:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3247-1", "initial_release_date": "2016-12-22T13:32:10Z", "revision_history": [ { "date": "2016-12-22T13:32:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-22T13:32:10Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-22T13:32:10Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3205-1
Vulnerability from csaf_suse
Published
2016-12-21 12:47
Modified
2016-12-21 12:47
Summary
Security update for Linux Kernel Live Patch 9 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.67-60_64_18 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1865
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 9 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.67-60_64_18 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1865", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3205-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3205-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163205-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3205-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002502.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 9 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-21T12:47:45Z", "generator": { "date": "2016-12-21T12:47:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3205-1", "initial_release_date": "2016-12-21T12:47:45Z", "revision_history": [ { "date": "2016-12-21T12:47:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-21T12:47:45Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-21T12:47:45Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3039-1
Vulnerability from csaf_suse
Published
2016-12-07 12:25
Modified
2016-12-07 12:25
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various critical security fixes.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring
function could be used by local attackers to crash the kernel or gain
privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in
the Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users to
gain privileges or cause a denial of service (heap-based buffer overflow)
by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacks chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds slab
access) or possibly have unspecified other impact via crafted SCTP data
(bnc#1011685).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1762,SUSE-SLE-Live-Patching-12-2016-1762,SUSE-SLE-Module-Public-Cloud-12-2016-1762,SUSE-SLE-SDK-12-SP1-2016-1762,SUSE-SLE-SERVER-12-SP1-2016-1762,SUSE-SLE-WE-12-SP1-2016-1762
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to receive various critical security fixes.\n\nThe following security bugs were fixed:\n\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring\n function could be used by local attackers to crash the kernel or gain\n privileges (bsc#1012754).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in\n the Linux kernel did not validate the relationship between the minimum\n fragment length and the maximum packet size, which allowed local users to\n gain privileges or cause a denial of service (heap-based buffer overflow)\n by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in\n the Linux kernel lacks chunk-length checking for the first chunk, which\n allowed remote attackers to cause a denial of service (out-of-bounds slab\n access) or possibly have unspecified other impact via crafted SCTP data\n (bnc#1011685).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1762,SUSE-SLE-Live-Patching-12-2016-1762,SUSE-SLE-Module-Public-Cloud-12-2016-1762,SUSE-SLE-SDK-12-SP1-2016-1762,SUSE-SLE-SERVER-12-SP1-2016-1762,SUSE-SLE-WE-12-SP1-2016-1762", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3039-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3039-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163039-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3039-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002444.html" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1012754", "url": "https://bugzilla.suse.com/1012754" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-07T12:25:51Z", "generator": { "date": "2016-12-07T12:25:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3039-1", "initial_release_date": "2016-12-07T12:25:51Z", "revision_history": [ { "date": "2016-12-07T12:25:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.67-60.64.21.1.noarch", "product": { "name": "kernel-devel-3.12.67-60.64.21.1.noarch", "product_id": "kernel-devel-3.12.67-60.64.21.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.67-60.64.21.1.noarch", "product": { "name": "kernel-macros-3.12.67-60.64.21.1.noarch", "product_id": "kernel-macros-3.12.67-60.64.21.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.67-60.64.21.1.noarch", "product": { "name": "kernel-source-3.12.67-60.64.21.1.noarch", "product_id": "kernel-source-3.12.67-60.64.21.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.67-60.64.21.3.noarch", "product": { "name": "kernel-docs-3.12.67-60.64.21.3.noarch", "product_id": "kernel-docs-3.12.67-60.64.21.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "product_id": "kernel-obs-build-3.12.67-60.64.21.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.67-60.64.21.1.ppc64le", "product": { "name": "kernel-default-3.12.67-60.64.21.1.ppc64le", "product_id": "kernel-default-3.12.67-60.64.21.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.67-60.64.21.1.ppc64le", "product": { "name": "kernel-default-base-3.12.67-60.64.21.1.ppc64le", "product_id": "kernel-default-base-3.12.67-60.64.21.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "product_id": "kernel-default-devel-3.12.67-60.64.21.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.67-60.64.21.1.ppc64le", "product": { "name": "kernel-syms-3.12.67-60.64.21.1.ppc64le", "product_id": "kernel-syms-3.12.67-60.64.21.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.67-60.64.21.1.s390x", "product": { "name": "kernel-obs-build-3.12.67-60.64.21.1.s390x", "product_id": "kernel-obs-build-3.12.67-60.64.21.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.67-60.64.21.1.s390x", "product": { "name": "kernel-default-3.12.67-60.64.21.1.s390x", "product_id": "kernel-default-3.12.67-60.64.21.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.67-60.64.21.1.s390x", "product": { "name": "kernel-default-base-3.12.67-60.64.21.1.s390x", "product_id": "kernel-default-base-3.12.67-60.64.21.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.67-60.64.21.1.s390x", "product": { "name": "kernel-default-devel-3.12.67-60.64.21.1.s390x", "product_id": "kernel-default-devel-3.12.67-60.64.21.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.67-60.64.21.1.s390x", "product": { "name": "kernel-default-man-3.12.67-60.64.21.1.s390x", "product_id": "kernel-default-man-3.12.67-60.64.21.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.67-60.64.21.1.s390x", "product": { "name": "kernel-syms-3.12.67-60.64.21.1.s390x", "product_id": "kernel-syms-3.12.67-60.64.21.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-default-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-default-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-default-devel-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-default-devel-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-default-extra-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-default-extra-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-syms-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-syms-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-xen-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-xen-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-ec2-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-ec2-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-ec2-devel-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-ec2-extra-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-obs-build-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-obs-build-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-default-base-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-default-base-3.12.67-60.64.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.67-60.64.21.1.x86_64", "product": { "name": "kernel-xen-base-3.12.67-60.64.21.1.x86_64", "product_id": "kernel-xen-base-3.12.67-60.64.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-devel-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-macros-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-source-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-syms-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-xen-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-ec2-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.67-60.64.21.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch" }, "product_reference": "kernel-docs-3.12.67-60.64.21.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-obs-build-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-default-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-default-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-default-base-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-base-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-default-devel-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-default-man-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-devel-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-macros-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-source-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-syms-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-syms-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-syms-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-xen-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-default-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-default-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-default-base-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-base-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-default-devel-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-default-man-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-devel-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-macros-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.67-60.64.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch" }, "product_reference": "kernel-source-3.12.67-60.64.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le" }, "product_reference": "kernel-syms-3.12.67-60.64.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.21.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x" }, "product_reference": "kernel-syms-3.12.67-60.64.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-syms-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-xen-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.67-60.64.21.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.67-60.64.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-07T12:25:51Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-07T12:25:51Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_21-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.21.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.21.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-07T12:25:51Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3113-1
Vulnerability from csaf_suse
Published
2016-12-13 11:50
Modified
2016-12-13 11:50
Summary
Security update for Linux Kernel Live Patch 14 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 14 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_49 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-SAP-12-2016-1808,SUSE-SLE-SERVER-12-2016-1808
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 14 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_49 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1808,SUSE-SLE-SERVER-12-2016-1808", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3113-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3113-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163113-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3113-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002480.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 14 for SLE 12", "tracking": { "current_release_date": "2016-12-13T11:50:46Z", "generator": { "date": "2016-12-13T11:50:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3113-1", "initial_release_date": "2016-12-13T11:50:46Z", "revision_history": [ { "date": "2016-12-13T11:50:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:50:46Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:50:46Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3049-1
Vulnerability from csaf_suse
Published
2016-12-07 18:29
Modified
2016-12-07 18:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical security fixes.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring
function could be used by local attackers to crash the kernel or gain
privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in
the Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users to
gain privileges or cause a denial of service (heap-based buffer overflow)
by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacks chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds slab
access) or possibly have unspecified other impact via crafted SCTP data
(bnc#1011685).
Patchnames
SUSE-SLE-DESKTOP-12-SP2-2016-1772,SUSE-SLE-HA-12-SP2-2016-1772,SUSE-SLE-Live-Patching-12-2016-1772,SUSE-SLE-RPI-12-SP2-2016-1772,SUSE-SLE-SDK-12-SP2-2016-1772,SUSE-SLE-SERVER-12-SP2-2016-1772,SUSE-SLE-WE-12-SP2-2016-1772
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical security fixes.\n\nThe following security bugs were fixed:\n\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring\n function could be used by local attackers to crash the kernel or gain\n privileges (bsc#1012754).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in\n the Linux kernel did not validate the relationship between the minimum\n fragment length and the maximum packet size, which allowed local users to\n gain privileges or cause a denial of service (heap-based buffer overflow)\n by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in\n the Linux kernel lacks chunk-length checking for the first chunk, which\n allowed remote attackers to cause a denial of service (out-of-bounds slab\n access) or possibly have unspecified other impact via crafted SCTP data\n (bnc#1011685).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP2-2016-1772,SUSE-SLE-HA-12-SP2-2016-1772,SUSE-SLE-Live-Patching-12-2016-1772,SUSE-SLE-RPI-12-SP2-2016-1772,SUSE-SLE-SDK-12-SP2-2016-1772,SUSE-SLE-SERVER-12-SP2-2016-1772,SUSE-SLE-WE-12-SP2-2016-1772", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3049-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3049-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163049-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3049-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002452.html" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1012754", "url": "https://bugzilla.suse.com/1012754" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-07T18:29:31Z", "generator": { "date": "2016-12-07T18:29:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3049-1", "initial_release_date": "2016-12-07T18:29:31Z", "revision_history": [ { "date": "2016-12-07T18:29:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.21-84.1.aarch64", "product": { "name": "kernel-default-4.4.21-84.1.aarch64", "product_id": "kernel-default-4.4.21-84.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.21-84.1.aarch64", "product": { "name": "kernel-default-base-4.4.21-84.1.aarch64", "product_id": "kernel-default-base-4.4.21-84.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.21-84.1.aarch64", "product": { "name": "kernel-default-devel-4.4.21-84.1.aarch64", "product_id": "kernel-default-devel-4.4.21-84.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.21-84.1.aarch64", "product": { "name": "kernel-syms-4.4.21-84.1.aarch64", "product_id": "kernel-syms-4.4.21-84.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.21-84.1.aarch64", "product": { "name": "kernel-obs-build-4.4.21-84.1.aarch64", "product_id": "kernel-obs-build-4.4.21-84.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.21-84.1.noarch", "product": { "name": "kernel-devel-4.4.21-84.1.noarch", "product_id": "kernel-devel-4.4.21-84.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.21-84.1.noarch", "product": { "name": "kernel-macros-4.4.21-84.1.noarch", "product_id": "kernel-macros-4.4.21-84.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.21-84.1.noarch", "product": { "name": "kernel-source-4.4.21-84.1.noarch", "product_id": "kernel-source-4.4.21-84.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.21-84.3.noarch", "product": { "name": "kernel-docs-4.4.21-84.3.noarch", "product_id": "kernel-docs-4.4.21-84.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.21-84.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.21-84.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.21-84.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.21-84.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.21-84.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.21-84.1.ppc64le", "product_id": "dlm-kmp-default-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.21-84.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.21-84.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.21-84.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.21-84.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.21-84.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.21-84.1.ppc64le", "product_id": "kernel-obs-build-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.21-84.1.ppc64le", "product": { "name": "kernel-default-4.4.21-84.1.ppc64le", "product_id": "kernel-default-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.21-84.1.ppc64le", "product": { "name": "kernel-default-base-4.4.21-84.1.ppc64le", "product_id": "kernel-default-base-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.21-84.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.21-84.1.ppc64le", "product_id": "kernel-default-devel-4.4.21-84.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.21-84.1.ppc64le", "product": { "name": "kernel-syms-4.4.21-84.1.ppc64le", "product_id": "kernel-syms-4.4.21-84.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.21-84.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.21-84.1.s390x", "product_id": "cluster-md-kmp-default-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.21-84.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.21-84.1.s390x", "product_id": "cluster-network-kmp-default-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.21-84.1.s390x", "product": { "name": "dlm-kmp-default-4.4.21-84.1.s390x", "product_id": "dlm-kmp-default-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.21-84.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.21-84.1.s390x", "product_id": "gfs2-kmp-default-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.21-84.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.21-84.1.s390x", "product_id": "ocfs2-kmp-default-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.21-84.1.s390x", "product": { "name": "kernel-obs-build-4.4.21-84.1.s390x", "product_id": "kernel-obs-build-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.21-84.1.s390x", "product": { "name": "kernel-default-4.4.21-84.1.s390x", "product_id": "kernel-default-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.21-84.1.s390x", "product": { "name": "kernel-default-base-4.4.21-84.1.s390x", "product_id": "kernel-default-base-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.21-84.1.s390x", "product": { "name": "kernel-default-devel-4.4.21-84.1.s390x", "product_id": "kernel-default-devel-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.21-84.1.s390x", "product": { "name": "kernel-default-man-4.4.21-84.1.s390x", "product_id": "kernel-default-man-4.4.21-84.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.21-84.1.s390x", "product": { "name": "kernel-syms-4.4.21-84.1.s390x", "product_id": "kernel-syms-4.4.21-84.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.21-84.1.x86_64", "product": { "name": "kernel-default-4.4.21-84.1.x86_64", "product_id": "kernel-default-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.21-84.1.x86_64", "product": { "name": "kernel-default-devel-4.4.21-84.1.x86_64", "product_id": "kernel-default-devel-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.21-84.1.x86_64", "product": { "name": "kernel-default-extra-4.4.21-84.1.x86_64", "product_id": "kernel-default-extra-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.21-84.1.x86_64", "product": { "name": "kernel-syms-4.4.21-84.1.x86_64", "product_id": "kernel-syms-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.21-84.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.21-84.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.21-84.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.21-84.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.21-84.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.21-84.1.x86_64", "product_id": "dlm-kmp-default-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.21-84.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.21-84.1.x86_64", "product_id": "gfs2-kmp-default-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.21-84.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.21-84.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "product_id": "kgraft-patch-4_4_21-84-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.21-84.1.x86_64", "product": { "name": "kernel-obs-build-4.4.21-84.1.x86_64", "product_id": "kernel-obs-build-4.4.21-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.21-84.1.x86_64", "product": { "name": "kernel-default-base-4.4.21-84.1.x86_64", "product_id": "kernel-default-base-4.4.21-84.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP2", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2", "product": { "name": "SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch" }, "product_reference": "kernel-devel-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch" }, "product_reference": "kernel-macros-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch" }, "product_reference": "kernel-source-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64" }, "product_reference": "kernel-syms-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.21-84.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.21-84.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.21-84.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.21-84.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.21-84.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_21-84-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-base-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch" }, "product_reference": "kernel-devel-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch" }, "product_reference": "kernel-macros-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch" }, "product_reference": "kernel-source-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64" }, "product_reference": "kernel-syms-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.4.21-84.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch" }, "product_reference": "kernel-docs-4.4.21-84.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64" }, "product_reference": "kernel-obs-build-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-obs-build-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x" }, "product_reference": "kernel-obs-build-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64" }, "product_reference": "kernel-obs-build-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-default-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x" }, "product_reference": "kernel-default-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-base-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x" }, "product_reference": "kernel-default-base-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-base-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x" }, "product_reference": "kernel-default-devel-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x" }, "product_reference": "kernel-default-man-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch" }, "product_reference": "kernel-devel-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch" }, "product_reference": "kernel-macros-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch" }, "product_reference": "kernel-source-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64" }, "product_reference": "kernel-syms-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-syms-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x" }, "product_reference": "kernel-syms-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64" }, "product_reference": "kernel-syms-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-default-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x" }, "product_reference": "kernel-default-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-base-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x" }, "product_reference": "kernel-default-base-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-base-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x" }, "product_reference": "kernel-default-devel-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x" }, "product_reference": "kernel-default-man-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch" }, "product_reference": "kernel-devel-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch" }, "product_reference": "kernel-macros-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.21-84.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch" }, "product_reference": "kernel-source-4.4.21-84.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64" }, "product_reference": "kernel-syms-4.4.21-84.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le" }, "product_reference": "kernel-syms-4.4.21-84.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x" }, "product_reference": "kernel-syms-4.4.21-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64" }, "product_reference": "kernel-syms-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.21-84.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.21-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-07T18:29:31Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-07T18:29:31Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Desktop 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-man-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.21-84.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-docs-4.4.21-84.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:kernel-obs-build-4.4.21-84.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP2:kernel-default-extra-4.4.21-84.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-07T18:29:31Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3063-1
Vulnerability from csaf_suse
Published
2016-12-09 08:13
Modified
2016-12-09 08:13
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to receive critical security fixes.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring
function could be used by local attackers to crash the kernel or gain
privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in
the Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users to
gain privileges or cause a denial of service (heap-based buffer overflow)
by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacks chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds slab
access) or possibly have unspecified other impact via crafted SCTP data
(bnc#1011685).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2016-1781,SUSE-SLE-SAP-12-2016-1781,SUSE-SLE-SERVER-12-2016-1781
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 kernel was updated to receive critical security fixes.\n\nThe following security bugs were fixed:\n\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring\n function could be used by local attackers to crash the kernel or gain\n privileges (bsc#1012754).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in\n the Linux kernel did not validate the relationship between the minimum\n fragment length and the maximum packet size, which allowed local users to\n gain privileges or cause a denial of service (heap-based buffer overflow)\n by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in\n the Linux kernel lacks chunk-length checking for the first chunk, which\n allowed remote attackers to cause a denial of service (out-of-bounds slab\n access) or possibly have unspecified other impact via crafted SCTP data\n (bnc#1011685).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2016-1781,SUSE-SLE-SAP-12-2016-1781,SUSE-SLE-SERVER-12-2016-1781", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3063-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3063-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163063-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3063-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002458.html" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1012754", "url": "https://bugzilla.suse.com/1012754" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-09T08:13:47Z", "generator": { "date": "2016-12-09T08:13:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3063-1", "initial_release_date": "2016-12-09T08:13:47Z", "revision_history": [ { "date": "2016-12-09T08:13:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.60-52.60.1.noarch", "product": { "name": "kernel-devel-3.12.60-52.60.1.noarch", "product_id": "kernel-devel-3.12.60-52.60.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.60-52.60.1.noarch", "product": { "name": "kernel-macros-3.12.60-52.60.1.noarch", "product_id": "kernel-macros-3.12.60-52.60.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.60-52.60.1.noarch", "product": { "name": "kernel-source-3.12.60-52.60.1.noarch", "product_id": "kernel-source-3.12.60-52.60.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.60-52.60.1.ppc64le", "product": { "name": "kernel-default-3.12.60-52.60.1.ppc64le", "product_id": "kernel-default-3.12.60-52.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.60.1.ppc64le", "product": { "name": "kernel-default-base-3.12.60-52.60.1.ppc64le", "product_id": "kernel-default-base-3.12.60-52.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.60.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.60-52.60.1.ppc64le", "product_id": "kernel-default-devel-3.12.60-52.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.60.1.ppc64le", "product": { "name": "kernel-syms-3.12.60-52.60.1.ppc64le", "product_id": "kernel-syms-3.12.60-52.60.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.60-52.60.1.s390x", "product": { "name": "kernel-default-3.12.60-52.60.1.s390x", "product_id": "kernel-default-3.12.60-52.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.60.1.s390x", "product": { "name": "kernel-default-base-3.12.60-52.60.1.s390x", "product_id": "kernel-default-base-3.12.60-52.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.60.1.s390x", "product": { "name": "kernel-default-devel-3.12.60-52.60.1.s390x", "product_id": "kernel-default-devel-3.12.60-52.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.60-52.60.1.s390x", "product": { "name": "kernel-default-man-3.12.60-52.60.1.s390x", "product_id": "kernel-default-man-3.12.60-52.60.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.60.1.s390x", "product": { "name": "kernel-syms-3.12.60-52.60.1.s390x", "product_id": "kernel-syms-3.12.60-52.60.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-ec2-3.12.60-52.60.1.x86_64", "product_id": "kernel-ec2-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.60-52.60.1.x86_64", "product_id": "kernel-ec2-devel-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.60-52.60.1.x86_64", "product_id": "kernel-ec2-extra-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-default-3.12.60-52.60.1.x86_64", "product_id": "kernel-default-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-default-base-3.12.60-52.60.1.x86_64", "product_id": "kernel-default-base-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-default-devel-3.12.60-52.60.1.x86_64", "product_id": "kernel-default-devel-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-syms-3.12.60-52.60.1.x86_64", "product_id": "kernel-syms-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-xen-3.12.60-52.60.1.x86_64", "product_id": "kernel-xen-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-xen-base-3.12.60-52.60.1.x86_64", "product_id": "kernel-xen-base-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.60-52.60.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.60-52.60.1.x86_64", "product_id": "kernel-xen-devel-3.12.60-52.60.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-ec2-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-default-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-default-base-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.60-52.60.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch" }, "product_reference": "kernel-devel-3.12.60-52.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.60-52.60.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch" }, "product_reference": "kernel-macros-3.12.60-52.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.60-52.60.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch" }, "product_reference": "kernel-source-3.12.60-52.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-syms-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-xen-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.60.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le" }, "product_reference": "kernel-default-3.12.60-52.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.60.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x" }, "product_reference": "kernel-default-3.12.60-52.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-default-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.60.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.60-52.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.60.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x" }, "product_reference": "kernel-default-base-3.12.60-52.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-default-base-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.60.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.60-52.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.60.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x" }, "product_reference": "kernel-default-devel-3.12.60-52.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.60-52.60.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x" }, "product_reference": "kernel-default-man-3.12.60-52.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.60-52.60.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch" }, "product_reference": "kernel-devel-3.12.60-52.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.60-52.60.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch" }, "product_reference": "kernel-macros-3.12.60-52.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.60-52.60.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch" }, "product_reference": "kernel-source-3.12.60-52.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.60.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le" }, "product_reference": "kernel-syms-3.12.60-52.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.60.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x" }, "product_reference": "kernel-syms-3.12.60-52.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-syms-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-xen-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.60-52.60.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.60-52.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T08:13:47Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T08:13:47Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T08:13:47Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3100-1
Vulnerability from csaf_suse
Published
2016-12-12 14:51
Modified
2016-12-12 14:51
Summary
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_20 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1798
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-60_20 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1798", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3100-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3100-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163100-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3100-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002472.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-12T14:51:22Z", "generator": { "date": "2016-12-12T14:51:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3100-1", "initial_release_date": "2016-12-12T14:51:22Z", "revision_history": [ { "date": "2016-12-12T14:51:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:22Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:22Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:22Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3116-1
Vulnerability from csaf_suse
Published
2016-12-13 12:33
Modified
2016-12-13 12:33
Summary
Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1813
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 8 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1813", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3116-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3116-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163116-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3116-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002482.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 8 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-13T12:33:17Z", "generator": { "date": "2016-12-13T12:33:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3116-1", "initial_release_date": "2016-12-13T12:33:17Z", "revision_history": [ { "date": "2016-12-13T12:33:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T12:33:17Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T12:33:17Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2017:1102-1
Vulnerability from csaf_suse
Published
2017-04-25 14:34
Modified
2017-04-25 14:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SLE-11 SP4 kernel was updated to 3.0.101.rt130-68 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserved the setgid bit during
a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the
existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of
an incomplete fix for CVE-2016-7097 (bnc#1021258).
- CVE-2016-7097: posix_acl: Clear SGID bit when setting file permissions (bsc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or
cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and
drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and
cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet,
especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: Denial of service in notify_change for filesystem xattrs (bsc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause
a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local
malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
because it first requires compromising a privileged process and current compiler optimizations restrict access to the
vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux
kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed
local users to cause a denial of service (memory corruption and system crash)
or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN
capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2)
SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly
initialize Code Segment (CS) in certain error cases, which allowed local users
to obtain sensitive information from kernel stack memory via a crafted
application (bnc#1013038).
- CVE-2016-9576: splice: introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE (bsc#1013604)
- CVE-2016-9794: ALSA: pcm : Call kill_fasync() in stream lock (bsc#1013533)
- CVE-2016-3841: KABI workaround for ipv6: add complete rcu protection around np->opt (bsc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c
in the Linux kernel allowed local users to cause a denial of service (memory
consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in
drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or
cause a denial of service (memory corruption and system crash) by detaching a
device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the
Linux kernel lacks chunk-length checking for the first chunk, which allowed
remote attackers to cause a denial of service (out-of-bounds slab access) or
possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in
block/genhd.c in the Linux kernel allowed local users to gain privileges by
leveraging the execution of a certain stop operation even if the corresponding
start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in
block/ioprio.c in the Linux kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted ioprio_get system call
(bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to
gain privileges or cause a denial of service (system crash) via a VAPIC
synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c
in the Linux kernel allowed local users to obtain sensitive information from
kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Revert 'proc: prevent accessing /proc/<PID>/environ until it's ready (bsc#1010467)'
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux
kernel allowed local users to cause a denial of service (OOPS) by attempting to
trigger use of in-kernel hash algorithms for a socket that has received zero
bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in
certain unusual hardware configurations, allowed remote attackers to execute
arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: KEYS: Fix short sprintf buffer in /proc/keys show function (bsc#1004517).
- CVE-2015-8956: Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925).
- CVE-2016-7117: net: Fix use after free in the recvmmsg exit path (bsc#1003077).
The following non-security bugs were fixed:
- blacklist.conf: 45f13df be2net: Enable Wake-On-LAN from shutdown for Skyhawk
- blacklist.conf: c9cc599 net/mlx4_core: Fix QUERY FUNC CAP flags
- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- IB/mlx4: Fix error flow when sending mads under SRIOV (bsc#786036).
- IB/mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036).
- IB/mlx4: Fix memory leak if QP creation failed (bsc#786036).
- IB/mlx4: Fix potential deadlock when sending mad to wire (bsc#786036).
- IB/mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036).
- IB/mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#908684).
- cifs: revert fs/cifs: fix wrongly prefixed path to root (bsc#963655)
- config.conf: add bigmem flavour on ppc64
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cpumask_set_cpu_local_first => cpumask_local_spread, lament (bug#919382).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106 (bsc#913387, #bsc1016831).
- dm space map metadata: fix sm_bootstrap_get_nr_blocks()
- dm thin: fix race condition when destroying thin pool workqueue
- dm: do not call dm_sync_table() when creating new devices (bnc#901809, bsc#1008893).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: make share unaccessible at root level mountable (bsc#799133).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).
- hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).
- hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).
- hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).
- hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).
- hv: vmbus: handle various crash scenarios (bnc#986337).
- hv: vmbus: remove code duplication in message handling (bnc#986337).
- hv: vss: run only on supported host versions (bnc#986337).
- i40e: fix an uninitialized variable bug (bsc#909484).
- ibmveth: calculate gso_segs for large packets (bsc#1019165, bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019165, bsc#1019148).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297).
- igb: Fix oops caused by missing queue pairing (bsc#909491).
- igb: Fix oops on changing number of rings (bsc#909491).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491).
- igb: Unpair the queues when changing the number of queues (bsc#909491).
- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).
- kabi-fix for flock_owner addition (bsc#998689).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- libata: introduce ata_host->n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- md/raid10: Fix memory leak when raid10 reshape completes
- md/raid10: always set reshape_safe when initializing reshape_position
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: fix problem when adding device to read-only array with bitmap (bnc#771065).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036).
- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).
- mm/memory.c: actually remap enough memory (bnc#1005903).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).
- dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708 bsc#786036).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bug#919382).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382).
- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).
- netfront: do not truncate grant references.
- netvsc: fix incorrect receive checksum offloading (bnc#1006917).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- oom: print nodemask in the oom report (bnc#1003866).
- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).
- powerpc/mm: Change the swap encoding in pte (bsc#973203).
- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).
- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).
- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).
- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).
- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).
- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).
- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).
- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).
- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).
- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).
- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).
- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: Update kernel VSID range (bsc#928138,fate#319026).
- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC'
obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350).
- qlcnic: fix a timeout loop (bsc#909350)
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/package-descriptions: add -bigmem description
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).
- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).
- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618).
- softirq: sirq threads raising another sirq delegate to the proper thread Otherwise, high priority timer threads expend
cycles precessing other sirqs, potentially increasing wakeup latencies as thes process sirqs at a priority other than
the priority specified by the user.
- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458).
- tg3: Fix temperature reporting (bnc#790588).
- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86, amd_nb: Clarify F15h, model 30h GART and L3 support
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors
- x86/gart: Check for GART support before accessing GART registers
- xenbus: do not invoke ->is_ready() for most device states (bsc#987333).
- zcrypt: Fix hang condition on crypto card config-off (bsc#1016320).
- zcrypt: Fix invalid domain response handling (bsc#1016320).
- zfcp: Fix erratic device offline during EH (bsc#993832).
- zfcp: close window with unblocked rport during rport gone (bnc#1003677).
- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677).
- zfcp: fix ELS/GS request&response length for hardware data router (bnc#1003677).
- zfcp: fix payload trace length for SAN request&response (bnc#1003677).
- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677).
- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677).
- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677).
- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677).
- zfcp: trace on request for open and close of WKA port (bnc#1003677).
Patchnames
slertesp4-kernel-13074
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SLE-11 SP4 kernel was updated to 3.0.101.rt130-68 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserved the setgid bit during\n a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the\n existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of\n an incomplete fix for CVE-2016-7097 (bnc#1021258).\n- CVE-2016-7097: posix_acl: Clear SGID bit when setting file permissions (bsc#995968).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations\n where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or\n cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and \n drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and\n cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet,\n especially in protocols that use long-lived connections, such as BGP (bnc#989152).\n- CVE-2015-1350: Denial of service in notify_change for filesystem xattrs (bsc#914939).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship\n between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause\n a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local\n malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate\n because it first requires compromising a privileged process and current compiler optimizations restrict access to the\n vulnerable code. (bnc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of \n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux\n kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed\n local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN\n capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2)\n SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly\n initialize Code Segment (CS) in certain error cases, which allowed local users\n to obtain sensitive information from kernel stack memory via a crafted\n application (bnc#1013038).\n- CVE-2016-9576: splice: introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE (bsc#1013604)\n- CVE-2016-9794: ALSA: pcm : Call kill_fasync() in stream lock (bsc#1013533)\n- CVE-2016-3841: KABI workaround for ipv6: add complete rcu protection around np-\u003eopt (bsc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c\n in the Linux kernel allowed local users to cause a denial of service (memory\n consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or\n cause a denial of service (memory corruption and system crash) by detaching a\n device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the\n Linux kernel lacks chunk-length checking for the first chunk, which allowed\n remote attackers to cause a denial of service (out-of-bounds slab access) or\n possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n - CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in\n block/genhd.c in the Linux kernel allowed local users to gain privileges by\n leveraging the execution of a certain stop operation even if the corresponding\n start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in\n block/ioprio.c in the Linux kernel allowed local users to gain privileges or\n cause a denial of service (use-after-free) via a crafted ioprio_get system call\n (bnc#1010711).\n- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to\n gain privileges or cause a denial of service (system crash) via a VAPIC\n synchronization operation involving a page-end address (bnc#853052).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c\n in the Linux kernel allowed local users to obtain sensitive information from\n kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Revert \u0027proc: prevent accessing /proc/\u003cPID\u003e/environ until it\u0027s ready (bsc#1010467)\u0027\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux\n kernel allowed local users to cause a denial of service (OOPS) by attempting to\n trigger use of in-kernel hash algorithms for a socket that has received zero\n bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in\n certain unusual hardware configurations, allowed remote attackers to execute\n arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: KEYS: Fix short sprintf buffer in /proc/keys show function (bsc#1004517).\n- CVE-2015-8956: Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925).\n- CVE-2016-7117: net: Fix use after free in the recvmmsg exit path (bsc#1003077).\n\nThe following non-security bugs were fixed:\n\n- blacklist.conf: 45f13df be2net: Enable Wake-On-LAN from shutdown for Skyhawk\n- blacklist.conf: c9cc599 net/mlx4_core: Fix QUERY FUNC CAP flags\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).\n- IB/mlx4: Fix error flow when sending mads under SRIOV (bsc#786036).\n- IB/mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036).\n- IB/mlx4: Fix memory leak if QP creation failed (bsc#786036).\n- IB/mlx4: Fix potential deadlock when sending mad to wire (bsc#786036).\n- IB/mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036).\n- IB/mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036).\n- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- be2net: Do not leak iomapped memory on removal (bug#925065).\n- block_dev: do not test bdev-\u003ebd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- bnx2x: fix lockdep splat (bsc#908684).\n- cifs: revert fs/cifs: fix wrongly prefixed path to root (bsc#963655)\n- config.conf: add bigmem flavour on ppc64\n- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).\n- cpumask_set_cpu_local_first =\u003e cpumask_local_spread, lament (bug#919382).\n- crypto: add ghash-generic in the supported.conf(bsc#1016824)\n- crypto: aesni - Add support for 192 \u0026 256 bit keys to AESNI RFC4106 (bsc#913387, #bsc1016831).\n- dm space map metadata: fix sm_bootstrap_get_nr_blocks()\n- dm thin: fix race condition when destroying thin pool workqueue\n- dm: do not call dm_sync_table() when creating new devices (bnc#901809, bsc#1008893).\n- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)\n- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).\n- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).\n- ext4: fix reference counting bug on block allocation error (bsc#1013018).\n- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).\n- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).\n- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).\n- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).\n- fs/cifs: cifs_get_root shouldn\u0027t use path with tree name (bsc#963655, bsc#979681).\n- fs/cifs: make share unaccessible at root level mountable (bsc#799133).\n- futex: Acknowledge a new waiter in counter before plist (bsc#851603).\n- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).\n- hpilo: Add support for iLO5 (bsc#999101).\n- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).\n- hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).\n- hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).\n- hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).\n- hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).\n- hv: vmbus: handle various crash scenarios (bnc#986337).\n- hv: vmbus: remove code duplication in message handling (bnc#986337).\n- hv: vss: run only on supported host versions (bnc#986337).\n- i40e: fix an uninitialized variable bug (bsc#909484).\n- ibmveth: calculate gso_segs for large packets (bsc#1019165, bsc#1019148).\n- ibmveth: set correct gso_size and gso_type (bsc#1019165, bsc#1019148).\n- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491).\n- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297).\n- igb: Fix oops caused by missing queue pairing (bsc#909491).\n- igb: Fix oops on changing number of rings (bsc#909491).\n- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491).\n- igb: Unpair the queues when changing the number of queues (bsc#909491).\n- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).\n- kabi-fix for flock_owner addition (bsc#998689).\n- kexec: add a kexec_crash_loaded() function (bsc#973691).\n- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).\n- kvm: Distangle eventfd code from irqchip (bsc#989680).\n- kvm: Iterate over only vcpus that are preempted (bsc#989680).\n- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).\n- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).\n- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).\n- kvm: make processes waiting on vcpu mutex killable (bsc#989680).\n- kvm: nVMX: Add preemption timer support (bsc#989680).\n- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).\n- kvm: use symbolic constant for nr interrupts (bsc#989680).\n- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).\n- kvm: x86: Run PIT work in own kthread (bsc#989680).\n- kvm: x86: limit difference between kvmclock updates (bsc#989680).\n- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).\n- lib/vsprintf: implement bitmap printing through \u0027%*pb[l]\u0027 (bnc#1003866).\n- libata: introduce ata_host-\u003en_tags to avoid oops on SAS controllers (bsc#871728).\n- libata: remove n_tags to avoid kABI breakage (bsc#871728).\n- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: Update rport reference counting (bsc#953233).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).\n- md/raid10: Fix memory leak when raid10 reshape completes\n- md/raid10: always set reshape_safe when initializing reshape_position\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: fix problem when adding device to read-only array with bitmap (bnc#771065).\n- memstick: mspro_block: add missing curly braces (bsc#1016688).\n- mlx4: add missing braces in verify_qp_parameters (bsc#786036).\n- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).\n- mm/memory.c: actually remap enough memory (bnc#1005903).\n- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).\n- mm: fix crashes from mbind() merging vmas (bnc#1005877).\n- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).\n- dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).\n- mshyperv: fix recognition of Hyper-V guest crash MSR\u0027s (bnc#986337).\n- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036).\n- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382).\n- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036).\n- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).\n- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708 bsc#786036).\n- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bug#919382).\n- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036).\n- net/mlx4_core: Implement pci_resume callback (bsc#924708).\n- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382).\n- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382).\n- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382).\n- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036).\n- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036).\n- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382).\n- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382).\n- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).\n- netfront: do not truncate grant references.\n- netvsc: fix incorrect receive checksum offloading (bnc#1006917).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nvme: Automatic namespace rescan (bsc#1017686).\n- nvme: Metadata format support (bsc#1017686).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- oom: print nodemask in the oom report (bnc#1003866).\n- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models\n- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).\n- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).\n- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).\n- powerpc/mm: Change the swap encoding in pte (bsc#973203).\n- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).\n- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).\n- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).\n- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).\n- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).\n- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).\n- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).\n- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).\n- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).\n- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).\n- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).\n- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS \u0026 cscope (bsc#967716).\n- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils \u003c 2.12.1 (bsc#967716).\n- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- powerpc: Update kernel VSID range (bsc#928138,fate#319026).\n- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo \u0027CONFIG_PMAC\u0027\n obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: fix typo \u0027CONFIG_PPC_CPU\u0027 (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).\n- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).\n- qlcnic: fix a loop exit condition better (bsc#909350).\n- qlcnic: fix a timeout loop (bsc#909350)\n- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/package-descriptions: add -bigmem description\n- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).\n- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).\n- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).\n- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).\n- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).\n- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).\n- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832).\n- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618).\n- softirq: sirq threads raising another sirq delegate to the proper thread Otherwise, high priority timer threads expend\n cycles precessing other sirqs, potentially increasing wakeup latencies as thes process sirqs at a priority other than\n the priority specified by the user.\n- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).\n- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).\n- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).\n- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458).\n- tg3: Fix temperature reporting (bnc#790588).\n- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).\n- usb: console: fix potential use after free (bsc#1015817).\n- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).\n- usb: cp210x: Corrected USB request type definitions (bsc#1015932).\n- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).\n- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).\n- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).\n- usb: ipaq.c: fix a timeout loop (bsc#1015848).\n- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).\n- usb: option: fix runtime PM handling (bsc#1015752).\n- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).\n- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).\n- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).\n- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).\n- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).\n- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).\n- usb: sierra: fix AA deadlock in open error path (bsc#1015561).\n- usb: sierra: fix remote wakeup (bsc#1015561).\n- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).\n- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).\n- usb: sierra: fix use after free at suspend/resume (bsc#1015561).\n- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).\n- usb: usb_wwan: fix race between write and resume (bsc#1015760).\n- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).\n- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).\n- usb: usb_wwan: fix write and suspend race (bsc#1015760).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86, amd_nb: Clarify F15h, model 30h GART and L3 support\n- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).\n- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors\n- x86/gart: Check for GART support before accessing GART registers\n- xenbus: do not invoke -\u003eis_ready() for most device states (bsc#987333).\n- zcrypt: Fix hang condition on crypto card config-off (bsc#1016320).\n- zcrypt: Fix invalid domain response handling (bsc#1016320).\n- zfcp: Fix erratic device offline during EH (bsc#993832).\n- zfcp: close window with unblocked rport during rport gone (bnc#1003677).\n- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677).\n- zfcp: fix ELS/GS request\u0026response length for hardware data router (bnc#1003677).\n- zfcp: fix payload trace length for SAN request\u0026response (bnc#1003677).\n- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677).\n- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677).\n- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677).\n- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677).\n- zfcp: trace on request for open and close of WKA port (bnc#1003677).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-13074", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1102-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1102-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171102-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1102-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003344", "url": "https://bugzilla.suse.com/1003344" }, { "category": "self", "summary": "SUSE Bug 1003568", "url": "https://bugzilla.suse.com/1003568" }, { "category": "self", "summary": "SUSE Bug 1003677", "url": "https://bugzilla.suse.com/1003677" }, { "category": "self", "summary": "SUSE Bug 1003813", "url": "https://bugzilla.suse.com/1003813" }, { "category": "self", "summary": "SUSE Bug 1003866", "url": "https://bugzilla.suse.com/1003866" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1004520", "url": "https://bugzilla.suse.com/1004520" }, { "category": "self", "summary": "SUSE Bug 1005857", "url": "https://bugzilla.suse.com/1005857" }, { "category": "self", "summary": "SUSE Bug 1005877", "url": "https://bugzilla.suse.com/1005877" }, { "category": "self", "summary": "SUSE Bug 1005896", "url": "https://bugzilla.suse.com/1005896" }, { "category": "self", "summary": "SUSE Bug 1005903", "url": "https://bugzilla.suse.com/1005903" }, { "category": "self", "summary": "SUSE Bug 1006917", "url": "https://bugzilla.suse.com/1006917" }, { "category": "self", "summary": "SUSE Bug 1006919", "url": "https://bugzilla.suse.com/1006919" }, { "category": "self", "summary": "SUSE Bug 1007615", "url": "https://bugzilla.suse.com/1007615" }, { "category": "self", "summary": "SUSE Bug 1007944", "url": "https://bugzilla.suse.com/1007944" }, { "category": "self", "summary": "SUSE Bug 1008557", "url": "https://bugzilla.suse.com/1008557" }, { "category": "self", "summary": "SUSE Bug 1008645", "url": "https://bugzilla.suse.com/1008645" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008893", "url": "https://bugzilla.suse.com/1008893" }, { "category": "self", "summary": "SUSE Bug 1009875", "url": "https://bugzilla.suse.com/1009875" }, { "category": "self", "summary": "SUSE Bug 1010150", "url": "https://bugzilla.suse.com/1010150" }, { "category": "self", "summary": "SUSE Bug 1010175", "url": "https://bugzilla.suse.com/1010175" }, { "category": "self", "summary": "SUSE Bug 1010201", "url": "https://bugzilla.suse.com/1010201" }, { "category": "self", "summary": "SUSE Bug 1010467", "url": "https://bugzilla.suse.com/1010467" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1011820", "url": "https://bugzilla.suse.com/1011820" }, { "category": "self", "summary": "SUSE Bug 1012411", "url": "https://bugzilla.suse.com/1012411" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012832", "url": "https://bugzilla.suse.com/1012832" }, { "category": "self", "summary": "SUSE Bug 1012851", "url": "https://bugzilla.suse.com/1012851" }, { "category": "self", "summary": "SUSE Bug 1012917", "url": "https://bugzilla.suse.com/1012917" }, { "category": "self", "summary": "SUSE Bug 1013018", "url": "https://bugzilla.suse.com/1013018" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013042", "url": "https://bugzilla.suse.com/1013042" }, { "category": "self", "summary": "SUSE Bug 1013070", "url": "https://bugzilla.suse.com/1013070" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013533", "url": "https://bugzilla.suse.com/1013533" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1013604", "url": "https://bugzilla.suse.com/1013604" }, { "category": "self", "summary": "SUSE Bug 1014410", "url": "https://bugzilla.suse.com/1014410" }, { "category": "self", "summary": "SUSE Bug 1014454", "url": "https://bugzilla.suse.com/1014454" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1015561", "url": "https://bugzilla.suse.com/1015561" }, { "category": "self", "summary": "SUSE Bug 1015752", "url": "https://bugzilla.suse.com/1015752" }, { "category": "self", "summary": "SUSE Bug 1015760", "url": "https://bugzilla.suse.com/1015760" }, { "category": "self", "summary": "SUSE Bug 1015796", "url": "https://bugzilla.suse.com/1015796" }, { "category": "self", "summary": "SUSE Bug 1015803", "url": "https://bugzilla.suse.com/1015803" }, { "category": "self", "summary": "SUSE Bug 1015817", "url": "https://bugzilla.suse.com/1015817" }, { "category": "self", "summary": "SUSE Bug 1015828", "url": "https://bugzilla.suse.com/1015828" }, { "category": "self", "summary": "SUSE Bug 1015844", "url": "https://bugzilla.suse.com/1015844" }, { "category": "self", "summary": "SUSE Bug 1015848", "url": "https://bugzilla.suse.com/1015848" }, { "category": "self", "summary": "SUSE Bug 1015878", "url": "https://bugzilla.suse.com/1015878" }, { "category": "self", "summary": "SUSE Bug 1015932", "url": "https://bugzilla.suse.com/1015932" }, { "category": "self", "summary": "SUSE Bug 1016320", "url": "https://bugzilla.suse.com/1016320" }, { "category": "self", "summary": "SUSE Bug 1016505", "url": "https://bugzilla.suse.com/1016505" }, { "category": "self", "summary": "SUSE Bug 1016520", "url": "https://bugzilla.suse.com/1016520" }, { "category": "self", "summary": "SUSE Bug 1016668", "url": "https://bugzilla.suse.com/1016668" }, { "category": "self", "summary": "SUSE Bug 1016688", "url": "https://bugzilla.suse.com/1016688" }, { "category": "self", "summary": "SUSE Bug 1016824", "url": "https://bugzilla.suse.com/1016824" }, { "category": "self", "summary": "SUSE Bug 1016831", "url": "https://bugzilla.suse.com/1016831" }, { "category": "self", "summary": "SUSE Bug 1017686", "url": "https://bugzilla.suse.com/1017686" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1019148", "url": "https://bugzilla.suse.com/1019148" }, { "category": "self", "summary": "SUSE Bug 1019165", "url": "https://bugzilla.suse.com/1019165" }, { "category": "self", "summary": "SUSE Bug 1019348", "url": "https://bugzilla.suse.com/1019348" }, { "category": "self", "summary": "SUSE Bug 1019783", "url": "https://bugzilla.suse.com/1019783" }, { "category": "self", "summary": "SUSE Bug 1020214", "url": "https://bugzilla.suse.com/1020214" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 748806", "url": "https://bugzilla.suse.com/748806" }, { "category": "self", "summary": "SUSE Bug 763198", "url": "https://bugzilla.suse.com/763198" }, { "category": "self", "summary": "SUSE Bug 771065", "url": "https://bugzilla.suse.com/771065" }, { "category": "self", "summary": "SUSE Bug 786036", "url": "https://bugzilla.suse.com/786036" }, { "category": "self", "summary": "SUSE Bug 790588", "url": "https://bugzilla.suse.com/790588" }, { "category": "self", "summary": "SUSE Bug 795297", "url": "https://bugzilla.suse.com/795297" }, { "category": "self", "summary": "SUSE Bug 799133", "url": "https://bugzilla.suse.com/799133" }, { "category": "self", "summary": "SUSE Bug 800999", "url": "https://bugzilla.suse.com/800999" }, { "category": "self", "summary": "SUSE Bug 803320", "url": "https://bugzilla.suse.com/803320" }, { "category": "self", "summary": "SUSE Bug 821612", "url": "https://bugzilla.suse.com/821612" }, { "category": "self", "summary": "SUSE Bug 824171", "url": "https://bugzilla.suse.com/824171" }, { "category": "self", "summary": "SUSE Bug 851603", "url": "https://bugzilla.suse.com/851603" }, { "category": "self", "summary": "SUSE Bug 853052", "url": "https://bugzilla.suse.com/853052" }, { "category": "self", "summary": "SUSE Bug 860441", "url": "https://bugzilla.suse.com/860441" }, { "category": "self", "summary": "SUSE Bug 863873", "url": "https://bugzilla.suse.com/863873" }, { "category": "self", "summary": "SUSE Bug 865783", "url": "https://bugzilla.suse.com/865783" }, { "category": "self", "summary": "SUSE Bug 871728", "url": "https://bugzilla.suse.com/871728" }, { "category": "self", "summary": "SUSE Bug 901809", "url": "https://bugzilla.suse.com/901809" }, { "category": "self", "summary": "SUSE Bug 907611", "url": "https://bugzilla.suse.com/907611" }, { "category": "self", "summary": "SUSE Bug 908458", "url": "https://bugzilla.suse.com/908458" }, { "category": "self", "summary": "SUSE Bug 908684", "url": "https://bugzilla.suse.com/908684" }, { "category": "self", "summary": "SUSE Bug 909077", "url": "https://bugzilla.suse.com/909077" }, { "category": "self", "summary": "SUSE Bug 909350", "url": "https://bugzilla.suse.com/909350" }, { "category": "self", "summary": "SUSE Bug 909484", "url": "https://bugzilla.suse.com/909484" }, { "category": "self", "summary": "SUSE Bug 909491", "url": "https://bugzilla.suse.com/909491" }, { "category": "self", "summary": "SUSE Bug 909618", "url": "https://bugzilla.suse.com/909618" }, { "category": "self", "summary": "SUSE Bug 913387", "url": "https://bugzilla.suse.com/913387" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 919382", "url": "https://bugzilla.suse.com/919382" }, { "category": "self", "summary": "SUSE Bug 922634", "url": "https://bugzilla.suse.com/922634" }, { "category": "self", "summary": "SUSE Bug 924708", "url": "https://bugzilla.suse.com/924708" }, { "category": "self", "summary": "SUSE Bug 925065", "url": "https://bugzilla.suse.com/925065" }, { "category": "self", "summary": "SUSE Bug 928138", "url": "https://bugzilla.suse.com/928138" }, { "category": "self", "summary": "SUSE Bug 929141", "url": "https://bugzilla.suse.com/929141" }, { "category": "self", "summary": "SUSE Bug 953233", "url": "https://bugzilla.suse.com/953233" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 961589", "url": "https://bugzilla.suse.com/961589" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 967716", "url": "https://bugzilla.suse.com/967716" }, { "category": "self", "summary": "SUSE Bug 968010", "url": "https://bugzilla.suse.com/968010" }, { "category": "self", "summary": "SUSE Bug 969340", "url": "https://bugzilla.suse.com/969340" }, { "category": "self", "summary": "SUSE Bug 973203", "url": "https://bugzilla.suse.com/973203" }, { "category": "self", "summary": "SUSE Bug 973691", "url": "https://bugzilla.suse.com/973691" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 986337", "url": "https://bugzilla.suse.com/986337" }, { "category": "self", "summary": "SUSE Bug 987333", "url": "https://bugzilla.suse.com/987333" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989680", "url": "https://bugzilla.suse.com/989680" }, { "category": "self", "summary": "SUSE Bug 989764", "url": "https://bugzilla.suse.com/989764" }, { "category": "self", "summary": "SUSE Bug 989896", "url": "https://bugzilla.suse.com/989896" }, { "category": "self", "summary": "SUSE Bug 990245", "url": "https://bugzilla.suse.com/990245" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 992991", "url": "https://bugzilla.suse.com/992991" }, { "category": "self", "summary": "SUSE Bug 993739", "url": "https://bugzilla.suse.com/993739" }, { "category": "self", "summary": "SUSE Bug 993832", "url": "https://bugzilla.suse.com/993832" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996541", "url": "https://bugzilla.suse.com/996541" }, { "category": "self", "summary": "SUSE Bug 996557", "url": "https://bugzilla.suse.com/996557" }, { "category": "self", "summary": "SUSE Bug 997401", "url": "https://bugzilla.suse.com/997401" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 999101", "url": "https://bugzilla.suse.com/999101" }, { "category": "self", "summary": "SUSE Bug 999907", "url": "https://bugzilla.suse.com/999907" }, { "category": "self", "summary": "SUSE CVE CVE-2004-0230 page", "url": "https://www.suse.com/security/cve/CVE-2004-0230/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6704 page", "url": "https://www.suse.com/security/cve/CVE-2012-6704/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6368 page", "url": "https://www.suse.com/security/cve/CVE-2013-6368/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7916 page", "url": "https://www.suse.com/security/cve/CVE-2016-7916/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8646 page", "url": "https://www.suse.com/security/cve/CVE-2016-8646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9576 page", "url": "https://www.suse.com/security/cve/CVE-2016-9576/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9685 page", "url": "https://www.suse.com/security/cve/CVE-2016-9685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9794 page", "url": "https://www.suse.com/security/cve/CVE-2016-9794/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-04-25T14:34:26Z", "generator": { "date": "2017-04-25T14:34:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1102-1", "initial_release_date": "2017-04-25T14:34:26Z", "revision_history": [ { "date": "2017-04-25T14:34:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-0230" } ], "notes": [ { "category": "general", "text": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2004-0230", "url": "https://www.suse.com/security/cve/CVE-2004-0230" }, { "category": "external", "summary": "SUSE Bug 1184394 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1184394" }, { "category": "external", "summary": "SUSE Bug 1198501 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1198501" }, { "category": "external", "summary": "SUSE Bug 1206598 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1206598" }, { "category": "external", "summary": "SUSE Bug 969340 for CVE-2004-0230", "url": "https://bugzilla.suse.com/969340" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2004-0230", "url": "https://bugzilla.suse.com/989152" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2004-0230", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2004-0230" }, { "cve": "CVE-2012-6704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6704" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6704", "url": "https://www.suse.com/security/cve/CVE-2012-6704" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2012-6704" }, { "cve": "CVE-2013-6368", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6368" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6368", "url": "https://www.suse.com/security/cve/CVE-2013-6368" }, { "category": "external", "summary": "SUSE Bug 853052 for CVE-2013-6368", "url": "https://bugzilla.suse.com/853052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2013-6368" }, { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7916" } ], "notes": [ { "category": "general", "text": "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7916", "url": "https://www.suse.com/security/cve/CVE-2016-7916" }, { "category": "external", "summary": "SUSE Bug 1010467 for CVE-2016-7916", "url": "https://bugzilla.suse.com/1010467" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-7916" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8646" } ], "notes": [ { "category": "general", "text": "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8646", "url": "https://www.suse.com/security/cve/CVE-2016-8646" }, { "category": "external", "summary": "SUSE Bug 1010150 for CVE-2016-8646", "url": "https://bugzilla.suse.com/1010150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-8646" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9576" } ], "notes": [ { "category": "general", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9576", "url": "https://www.suse.com/security/cve/CVE-2016-9576" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1019668 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019668" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-9576" }, { "cve": "CVE-2016-9685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9685" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9685", "url": "https://www.suse.com/security/cve/CVE-2016-9685" }, { "category": "external", "summary": "SUSE Bug 1012832 for CVE-2016-9685", "url": "https://bugzilla.suse.com/1012832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2016-9685" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2016-9794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9794" } ], "notes": [ { "category": "general", "text": "Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9794", "url": "https://www.suse.com/security/cve/CVE-2016-9794" }, { "category": "external", "summary": "SUSE Bug 1013533 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013533" }, { "category": "external", "summary": "SUSE Bug 1013543 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013543" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013604" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-9794" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:3249-1
Vulnerability from csaf_suse
Published
2016-12-22 14:59
Modified
2016-12-22 14:59
Summary
Security update for Linux Kernel Live Patch 10 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 10 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_34 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-SAP-12-2016-1895,SUSE-SLE-SERVER-12-2016-1895
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 10 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_34 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1895,SUSE-SLE-SERVER-12-2016-1895", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3249-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3249-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163249-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3249-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002516.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 10 for SLE 12", "tracking": { "current_release_date": "2016-12-22T14:59:18Z", "generator": { "date": "2016-12-22T14:59:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3249-1", "initial_release_date": "2016-12-22T14:59:18Z", "revision_history": [ { "date": "2016-12-22T14:59:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-22T14:59:18Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-22T14:59:18Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-22T14:59:18Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3098-1
Vulnerability from csaf_suse
Published
2016-12-12 14:52
Modified
2016-12-12 14:52
Summary
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.53-60_30 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1800
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.53-60_30 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1800", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3098-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3098-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163098-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3098-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002471.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-12T14:52:02Z", "generator": { "date": "2016-12-12T14:52:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3098-1", "initial_release_date": "2016-12-12T14:52:02Z", "revision_history": [ { "date": "2016-12-12T14:52:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:52:02Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:52:02Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:52:02Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2017:0333-1
Vulnerability from csaf_suse
Published
2017-01-30 16:03
Modified
2017-01-30 16:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.
This is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.
The following security bugs were fixed:
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
The following non-security bugs were fixed:
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).
- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).
- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).
- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).
- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).
- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- Revert 's390/mm: fix asce_bits handling with dynamic pagetable levels' This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.
- rpm/config.sh: Set the release string to 0.7.<RELEASE> (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: series.conf
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
Patchnames
slessp2-kernel-12961
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThis is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.\n\nThe following security bugs were fixed:\n\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n\n\nThe following non-security bugs were fixed:\n\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).\n- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kvm: x86: SYSENTER emulation is broken (bsc#994618).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).\n- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).\n- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).\n- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).\n- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).\n- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).\n- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS \u0026 cscope (bsc#967716).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils \u003c 2.12.1 (bsc#967716).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).\n- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).\n- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- Revert \u0027s390/mm: fix asce_bits handling with dynamic pagetable levels\u0027 This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.\n- rpm/config.sh: Set the release string to 0.7.\u003cRELEASE\u003e (bsc#997059)\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: \tseries.conf\n- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).\n- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kernel-12961", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0333-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0333-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170333-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0333-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1007944", "url": "https://bugzilla.suse.com/1007944" }, { "category": "self", "summary": "SUSE Bug 1008645", "url": "https://bugzilla.suse.com/1008645" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1009443", "url": "https://bugzilla.suse.com/1009443" }, { "category": "self", "summary": "SUSE Bug 1010150", "url": "https://bugzilla.suse.com/1010150" }, { "category": "self", "summary": "SUSE Bug 1010467", "url": "https://bugzilla.suse.com/1010467" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011482", "url": "https://bugzilla.suse.com/1011482" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012832", "url": "https://bugzilla.suse.com/1012832" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 835175", "url": "https://bugzilla.suse.com/835175" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 863873", "url": "https://bugzilla.suse.com/863873" }, { "category": "self", "summary": "SUSE Bug 874145", "url": "https://bugzilla.suse.com/874145" }, { "category": "self", "summary": "SUSE Bug 896484", "url": "https://bugzilla.suse.com/896484" }, { "category": "self", "summary": "SUSE Bug 908069", "url": "https://bugzilla.suse.com/908069" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 922947", "url": "https://bugzilla.suse.com/922947" }, { "category": "self", "summary": "SUSE Bug 927287", "url": "https://bugzilla.suse.com/927287" }, { "category": "self", "summary": "SUSE Bug 940966", "url": "https://bugzilla.suse.com/940966" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 954984", "url": "https://bugzilla.suse.com/954984" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 958000", "url": "https://bugzilla.suse.com/958000" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 963053", "url": "https://bugzilla.suse.com/963053" }, { "category": "self", "summary": "SUSE Bug 967716", "url": "https://bugzilla.suse.com/967716" }, { "category": "self", "summary": "SUSE Bug 968500", "url": "https://bugzilla.suse.com/968500" }, { "category": "self", "summary": "SUSE Bug 969340", "url": "https://bugzilla.suse.com/969340" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979915", "url": "https://bugzilla.suse.com/979915" }, { "category": "self", "summary": "SUSE Bug 980363", "url": "https://bugzilla.suse.com/980363" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994436", "url": "https://bugzilla.suse.com/994436" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 997059", "url": "https://bugzilla.suse.com/997059" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2004-0230 page", "url": "https://www.suse.com/security/cve/CVE-2004-0230/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6704 page", "url": "https://www.suse.com/security/cve/CVE-2012-6704/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2189 page", "url": "https://www.suse.com/security/cve/CVE-2016-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7916 page", "url": "https://www.suse.com/security/cve/CVE-2016-7916/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8646 page", "url": "https://www.suse.com/security/cve/CVE-2016-8646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9685 page", "url": "https://www.suse.com/security/cve/CVE-2016-9685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-01-30T16:03:00Z", "generator": { "date": "2017-01-30T16:03:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0333-1", "initial_release_date": "2017-01-30T16:03:00Z", "revision_history": [ { "date": "2017-01-30T16:03:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-source-3.0.101-0.7.53.1.i586", "product_id": "kernel-source-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.i586", "product_id": "kernel-syms-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.7.53.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-base-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-man-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-source-3.0.101-0.7.53.1.s390x", "product_id": "kernel-source-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.s390x", "product_id": "kernel-syms-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-source-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-syms-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-0230" } ], "notes": [ { "category": "general", "text": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2004-0230", "url": "https://www.suse.com/security/cve/CVE-2004-0230" }, { "category": "external", "summary": "SUSE Bug 1184394 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1184394" }, { "category": "external", "summary": "SUSE Bug 1198501 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1198501" }, { "category": "external", "summary": "SUSE Bug 1206598 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1206598" }, { "category": "external", "summary": "SUSE Bug 969340 for CVE-2004-0230", "url": "https://bugzilla.suse.com/969340" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2004-0230", "url": "https://bugzilla.suse.com/989152" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2004-0230", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2004-0230" }, { "cve": "CVE-2012-6704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6704" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6704", "url": "https://www.suse.com/security/cve/CVE-2012-6704" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2012-6704" }, { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2189" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-4565. Reason: This candidate is a reservation duplicate of CVE-2016-4565. Notes: All CVE users should reference CVE-2016-4565 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2189", "url": "https://www.suse.com/security/cve/CVE-2016-2189" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-2189", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-2189", "url": "https://bugzilla.suse.com/980363" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-2189" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7916" } ], "notes": [ { "category": "general", "text": "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7916", "url": "https://www.suse.com/security/cve/CVE-2016-7916" }, { "category": "external", "summary": "SUSE Bug 1010467 for CVE-2016-7916", "url": "https://bugzilla.suse.com/1010467" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7916" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8646" } ], "notes": [ { "category": "general", "text": "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8646", "url": "https://www.suse.com/security/cve/CVE-2016-8646" }, { "category": "external", "summary": "SUSE Bug 1010150 for CVE-2016-8646", "url": "https://bugzilla.suse.com/1010150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8646" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9685" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9685", "url": "https://www.suse.com/security/cve/CVE-2016-9685" }, { "category": "external", "summary": "SUSE Bug 1012832 for CVE-2016-9685", "url": "https://bugzilla.suse.com/1012832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-9685" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:3109-1
Vulnerability from csaf_suse
Published
2016-12-13 11:51
Modified
2016-12-13 11:51
Summary
Security update for Linux Kernel Live Patch 13 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 13 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_45 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-SAP-12-2016-1809,SUSE-SLE-SERVER-12-2016-1809
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 13 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.55-52_45 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1809,SUSE-SLE-SERVER-12-2016-1809", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3109-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3109-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163109-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3109-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002476.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 13 for SLE 12", "tracking": { "current_release_date": "2016-12-13T11:51:01Z", "generator": { "date": "2016-12-13T11:51:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3109-1", "initial_release_date": "2016-12-13T11:51:01Z", "revision_history": [ { "date": "2016-12-13T11:51:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:51:01Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:51:01Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:51:01Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3111-1
Vulnerability from csaf_suse
Published
2016-12-13 11:50
Modified
2016-12-13 11:50
Summary
Security update for Linux Kernel Live Patch 9 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_31 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-SAP-12-2016-1806,SUSE-SLE-SERVER-12-2016-1806
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 9 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for the Linux Kernel 3.12.51-52_31 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1806,SUSE-SLE-SERVER-12-2016-1806", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3111-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3111-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163111-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3111-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002478.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 9 for SLE 12", "tracking": { "current_release_date": "2016-12-13T11:50:07Z", "generator": { "date": "2016-12-13T11:50:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3111-1", "initial_release_date": "2016-12-13T11:50:07Z", "revision_history": [ { "date": "2016-12-13T11:50:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:50:07Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:50:07Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-13T11:50:07Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2017:0494-1
Vulnerability from csaf_suse
Published
2017-02-17 13:56
Modified
2017-02-17 13:56
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374).
- CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local malicious application to execute arbitrary code within the context of the kernel bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain unusual hardware configurations allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux, when the GNU Compiler Collection (gcc) stack protector is enabled, used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
The following non-security bugs were fixed:
- Always include the git commit in KOTD builds. This allows us not to set it explicitly in builds submitted to the official distribution (bnc#821612, bnc#824171).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- NFS: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- NFS: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- NFSv4: add flock_owner to open context (bnc#998689).
- NFSv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- NFSv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- NFSv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- NFSv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (bsc#1012895).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, among others).
- __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- include/linux/math64.h: add div64_ul() (bsc#996329).
- kabi-fix for flock_owner addition (bsc#998689).
- kabi: get back scsi_device.current_cmnd (bsc#935436).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS and cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils lower than 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).
- qlcnic: Schedule napi directly in netpoll (bsc#966826).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/config.sh: Set a fitting release string (bsc#997059)
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#961923, LTC#135138).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: remove current_cmnd field from struct scsi_device (bsc#935436).
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xfs: remove the deprecated nodelaylog option (bsc#992906).
Patchnames
sleclo50sp3-linux-kernel-12992,sleman21-linux-kernel-12992,slemap21-linux-kernel-12992,sleposp3-linux-kernel-12992,slessp3-linux-kernel-12992,slexsp3-linux-kernel-12992
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374).\n- CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs (bsc#1021258).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local malicious application to execute arbitrary code within the context of the kernel bnc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain unusual hardware configurations allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux, when the GNU Compiler Collection (gcc) stack protector is enabled, used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file (bnc#994759).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n\nThe following non-security bugs were fixed:\n\n- Always include the git commit in KOTD builds. This allows us not to set it explicitly in builds submitted to the official distribution (bnc#821612, bnc#824171).\n- KVM: x86: SYSENTER emulation is broken (bsc#994618).\n- NFS: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- NFS: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- NFSv4: add flock_owner to open context (bnc#998689).\n- NFSv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- NFSv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- NFSv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- NFSv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).\n- SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (bsc#1012895).\n- USB: fix typo in wMaxPacketSize validation (bsc#991665).\n- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, among others).\n- __ptrace_may_access() should not deny sub-threads (bsc#1012851).\n- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- include/linux/math64.h: add div64_ul() (bsc#996329).\n- kabi-fix for flock_owner addition (bsc#998689).\n- kabi: get back scsi_device.current_cmnd (bsc#935436).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kexec: add a kexec_crash_loaded() function (bsc#973691).\n- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS and cscope (bsc#967716).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils lower than 2.12.1 (bsc#967716).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).\n- qlcnic: Schedule napi directly in netpoll (bsc#966826).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/config.sh: Set a fitting release string (bsc#997059)\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- s390/dasd: fix failfast for disconnected devices (bnc#961923, LTC#135138).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).\n- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).\n- scsi: remove current_cmnd field from struct scsi_device (bsc#935436). \n- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).\n- xfs: remove the deprecated nodelaylog option (bsc#992906).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo50sp3-linux-kernel-12992,sleman21-linux-kernel-12992,slemap21-linux-kernel-12992,sleposp3-linux-kernel-12992,slessp3-linux-kernel-12992,slexsp3-linux-kernel-12992", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0494-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0494-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170494-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0494-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1007944", "url": "https://bugzilla.suse.com/1007944" }, { "category": "self", "summary": "SUSE Bug 1008374", "url": "https://bugzilla.suse.com/1008374" }, { "category": "self", "summary": "SUSE Bug 1008645", "url": "https://bugzilla.suse.com/1008645" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008850", "url": "https://bugzilla.suse.com/1008850" }, { "category": "self", "summary": "SUSE Bug 1009875", "url": "https://bugzilla.suse.com/1009875" }, { "category": "self", "summary": "SUSE Bug 1010150", "url": "https://bugzilla.suse.com/1010150" }, { "category": "self", "summary": "SUSE Bug 1010467", "url": "https://bugzilla.suse.com/1010467" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010713", "url": "https://bugzilla.suse.com/1010713" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1011820", "url": "https://bugzilla.suse.com/1011820" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012832", "url": "https://bugzilla.suse.com/1012832" }, { "category": "self", "summary": "SUSE Bug 1012851", "url": "https://bugzilla.suse.com/1012851" }, { "category": "self", "summary": "SUSE Bug 1012852", "url": "https://bugzilla.suse.com/1012852" }, { "category": "self", "summary": "SUSE Bug 1012895", "url": "https://bugzilla.suse.com/1012895" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013042", "url": "https://bugzilla.suse.com/1013042" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014454", "url": "https://bugzilla.suse.com/1014454" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1015878", "url": "https://bugzilla.suse.com/1015878" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1018446", "url": "https://bugzilla.suse.com/1018446" }, { "category": "self", "summary": "SUSE Bug 1019079", "url": "https://bugzilla.suse.com/1019079" }, { "category": "self", "summary": "SUSE Bug 1019783", "url": "https://bugzilla.suse.com/1019783" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 821612", "url": "https://bugzilla.suse.com/821612" }, { "category": "self", "summary": "SUSE Bug 824171", "url": "https://bugzilla.suse.com/824171" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 929141", "url": "https://bugzilla.suse.com/929141" }, { "category": "self", "summary": "SUSE Bug 935436", "url": "https://bugzilla.suse.com/935436" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 961923", "url": "https://bugzilla.suse.com/961923" }, { "category": "self", "summary": "SUSE Bug 966826", "url": "https://bugzilla.suse.com/966826" }, { "category": "self", "summary": "SUSE Bug 967716", "url": "https://bugzilla.suse.com/967716" }, { "category": "self", "summary": "SUSE Bug 969340", "url": "https://bugzilla.suse.com/969340" }, { "category": "self", "summary": "SUSE Bug 973691", "url": "https://bugzilla.suse.com/973691" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 992569", "url": "https://bugzilla.suse.com/992569" }, { "category": "self", "summary": "SUSE Bug 992906", "url": "https://bugzilla.suse.com/992906" }, { "category": "self", "summary": "SUSE Bug 992991", "url": "https://bugzilla.suse.com/992991" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996329", "url": "https://bugzilla.suse.com/996329" }, { "category": "self", "summary": "SUSE Bug 996541", "url": "https://bugzilla.suse.com/996541" }, { "category": "self", "summary": "SUSE Bug 996557", "url": "https://bugzilla.suse.com/996557" }, { "category": "self", "summary": "SUSE Bug 997059", "url": "https://bugzilla.suse.com/997059" }, { "category": "self", "summary": "SUSE Bug 997401", "url": "https://bugzilla.suse.com/997401" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE Bug 999943", "url": "https://bugzilla.suse.com/999943" }, { "category": "self", "summary": "SUSE CVE CVE-2004-0230 page", "url": "https://www.suse.com/security/cve/CVE-2004-0230/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6704 page", "url": "https://www.suse.com/security/cve/CVE-2012-6704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8970 page", "url": "https://www.suse.com/security/cve/CVE-2015-8970/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7916 page", "url": "https://www.suse.com/security/cve/CVE-2016-7916/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8646 page", "url": "https://www.suse.com/security/cve/CVE-2016-8646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9685 page", "url": "https://www.suse.com/security/cve/CVE-2016-9685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-17T13:56:58Z", "generator": { "date": "2017-02-17T13:56:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0494-1", "initial_release_date": "2017-02-17T13:56:58Z", "revision_history": [ { "date": "2017-02-17T13:56:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.96.1.i586", "product_id": "kernel-default-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.96.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.96.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.96.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.96.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.96.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.96.1.i586", "product_id": "kernel-pae-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.96.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.96.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.96.1.i586", "product_id": "kernel-source-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.96.1.i586", "product_id": "kernel-syms-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.96.1.i586", "product_id": "kernel-trace-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.96.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.96.1.i586", "product_id": "kernel-xen-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.96.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.96.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.96.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.96.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.96.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.96.1.s390x", "product_id": "kernel-default-3.0.101-0.47.96.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.96.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.96.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.96.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.96.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.96.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.96.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.96.1.s390x", "product_id": "kernel-source-3.0.101-0.47.96.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.96.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.96.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.96.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.96.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.96.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.96.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.96.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.96.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.96.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-0230" } ], "notes": [ { "category": "general", "text": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2004-0230", "url": "https://www.suse.com/security/cve/CVE-2004-0230" }, { "category": "external", "summary": "SUSE Bug 1184394 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1184394" }, { "category": "external", "summary": "SUSE Bug 1198501 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1198501" }, { "category": "external", "summary": "SUSE Bug 1206598 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1206598" }, { "category": "external", "summary": "SUSE Bug 969340 for CVE-2004-0230", "url": "https://bugzilla.suse.com/969340" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2004-0230", "url": "https://bugzilla.suse.com/989152" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2004-0230", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2004-0230" }, { "cve": "CVE-2012-6704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6704" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6704", "url": "https://www.suse.com/security/cve/CVE-2012-6704" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2012-6704" }, { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2015-8970", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8970" } ], "notes": [ { "category": "general", "text": "crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8970", "url": "https://www.suse.com/security/cve/CVE-2015-8970" }, { "category": "external", "summary": "SUSE Bug 1008374 for CVE-2015-8970", "url": "https://bugzilla.suse.com/1008374" }, { "category": "external", "summary": "SUSE Bug 1008850 for CVE-2015-8970", "url": "https://bugzilla.suse.com/1008850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2015-8970" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7916" } ], "notes": [ { "category": "general", "text": "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7916", "url": "https://www.suse.com/security/cve/CVE-2016-7916" }, { "category": "external", "summary": "SUSE Bug 1010467 for CVE-2016-7916", "url": "https://bugzilla.suse.com/1010467" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-7916" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8646" } ], "notes": [ { "category": "general", "text": "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8646", "url": "https://www.suse.com/security/cve/CVE-2016-8646" }, { "category": "external", "summary": "SUSE Bug 1010150 for CVE-2016-8646", "url": "https://bugzilla.suse.com/1010150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-8646" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9685" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9685", "url": "https://www.suse.com/security/cve/CVE-2016-9685" }, { "category": "external", "summary": "SUSE Bug 1012832 for CVE-2016-9685", "url": "https://bugzilla.suse.com/1012832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "low" } ], "title": "CVE-2016-9685" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:56:58Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:3206-1
Vulnerability from csaf_suse
Published
2016-12-21 12:46
Modified
2016-12-21 12:46
Summary
Security update for Linux Kernel Live Patch 1 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 1 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.21-81 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1864
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.21-81 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1864", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3206-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3206-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163206-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3206-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002503.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP2", "tracking": { "current_release_date": "2016-12-21T12:46:59Z", "generator": { "date": "2016-12-21T12:46:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3206-1", "initial_release_date": "2016-12-21T12:46:59Z", "revision_history": [ { "date": "2016-12-21T12:46:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_21-81-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_21-81-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_21-81-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_21-81-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_21-81-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-21T12:46:59Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-21T12:46:59Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3183-1
Vulnerability from csaf_suse
Published
2016-12-16 14:27
Modified
2016-12-16 14:27
Summary
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.62-60_62 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1842
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.62-60_62 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1842", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3183-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3183-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163183-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3183-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002493.html" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-16T14:27:26Z", "generator": { "date": "2016-12-16T14:27:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3183-1", "initial_release_date": "2016-12-16T14:27:26Z", "revision_history": [ { "date": "2016-12-16T14:27:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-16T14:27:26Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-16T14:27:26Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
suse-su-2016:3094-1
Vulnerability from csaf_suse
Published
2016-12-12 14:51
Modified
2016-12-12 14:51
Summary
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.49-11 fixes several issues.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1797
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.49-11 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1797", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3094-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3094-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163094-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3094-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002469.html" }, { "category": "self", "summary": "SUSE Bug 1003253", "url": "https://bugzilla.suse.com/1003253" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012759", "url": "https://bugzilla.suse.com/1012759" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" } ], "title": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1", "tracking": { "current_release_date": "2016-12-12T14:51:03Z", "generator": { "date": "2016-12-12T14:51:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3094-1", "initial_release_date": "2016-12-12T14:51:03Z", "revision_history": [ { "date": "2016-12-12T14:51:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "product_id": "kgraft-patch-3_12_49-11-default-8-23.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_49-11-xen-8-23.2.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-xen-8-23.2.x86_64", "product_id": "kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-default-8-23.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-xen-8-23.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-xen-8-23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:03Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:03Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-8-23.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-8-23.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-12T14:51:03Z", "details": "important" } ], "title": "CVE-2016-9555" } ] }
fkie_cve-2016-9555
Vulnerability from fkie_nvd
Published
2016-11-28 03:59
Modified
2025-04-12 10:46
Severity ?
Summary
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6 | Issue Tracking, Patch, Vendor Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2017-0086.html | Third Party Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2017-0091.html | Third Party Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2017-0113.html | Third Party Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2017-0307.html | Third Party Advisory | |
cve@mitre.org | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8 | Release Notes, Vendor Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/11/22/18 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/94479 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1037339 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://bto.bluecoat.com/security-advisory/sa134 | Third Party Advisory | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1397930 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0086.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0091.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0113.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0307.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/11/22/18 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94479 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037339 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa134 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1397930 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A779DD72-34BF-411B-A324-7D4E130B3F99", "versionEndExcluding": "3.2.85", "versionStartIncluding": "3.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B846CBB-1438-4151-B9FC-816C9548110E", "versionEndExcluding": "3.10.105", "versionStartIncluding": "3.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "01D9DF52-357F-4FC6-927D-2A0D79CD9FBC", "versionEndExcluding": "3.12.68", "versionStartIncluding": "3.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1331ABAB-8C2B-4379-BA77-B655A5B9A83F", "versionEndExcluding": "3.16.40", "versionStartIncluding": "3.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AA77834-089F-4556-A00B-CAC1E08444BF", "versionEndExcluding": "3.18.49", "versionStartIncluding": "3.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C13E615E-4863-48DF-9278-DDE45DDE751E", "versionEndExcluding": "4.4.32", "versionStartIncluding": "3.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "579D05A2-508B-4816-A1B8-575A1179620F", "versionEndExcluding": "4.8.8", "versionStartIncluding": "4.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data." }, { "lang": "es", "value": "La funci\u00f3n sctp_sf_ootb en net/sctp/sm_statefuns.c en el kernel Linux en versiones anteriores a 4.8.8 carece de comprobaci\u00f3n de longitud de fragmento para el primer fragmento, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (acceso slab fuera de l\u00edmites) o tener otro posible impacto no especificado a trav\u00e9s de datos SCTP manipulados." } ], "id": "CVE-2016-9555", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-11-28T03:59:17.097", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/22/18" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94479" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037339" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/22/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2024:10128-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-debug-4.8.13-1.1 on GA media
Notes
Title of the patch
kernel-debug-4.8.13-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10128
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-debug-4.8.13-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10128", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10128-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3939 page", "url": "https://www.suse.com/security/cve/CVE-2009-3939/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4026 page", "url": "https://www.suse.com/security/cve/CVE-2009-4026/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4027 page", "url": "https://www.suse.com/security/cve/CVE-2009-4027/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4131 page", "url": "https://www.suse.com/security/cve/CVE-2009-4131/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4138 page", "url": "https://www.suse.com/security/cve/CVE-2009-4138/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4536 page", "url": "https://www.suse.com/security/cve/CVE-2009-4536/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4538 page", "url": "https://www.suse.com/security/cve/CVE-2009-4538/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1146 page", "url": "https://www.suse.com/security/cve/CVE-2010-1146/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1436 page", "url": "https://www.suse.com/security/cve/CVE-2010-1436/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1641 page", "url": "https://www.suse.com/security/cve/CVE-2010-1641/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2066 page", "url": "https://www.suse.com/security/cve/CVE-2010-2066/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2942 page", "url": "https://www.suse.com/security/cve/CVE-2010-2942/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2954 page", "url": "https://www.suse.com/security/cve/CVE-2010-2954/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2955 page", "url": "https://www.suse.com/security/cve/CVE-2010-2955/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3081 page", "url": "https://www.suse.com/security/cve/CVE-2010-3081/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3296 page", "url": "https://www.suse.com/security/cve/CVE-2010-3296/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3297 page", "url": "https://www.suse.com/security/cve/CVE-2010-3297/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3298 page", "url": "https://www.suse.com/security/cve/CVE-2010-3298/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3301 page", "url": "https://www.suse.com/security/cve/CVE-2010-3301/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3310 page", "url": "https://www.suse.com/security/cve/CVE-2010-3310/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0711 page", "url": "https://www.suse.com/security/cve/CVE-2011-0711/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0712 page", "url": "https://www.suse.com/security/cve/CVE-2011-0712/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1020 page", "url": "https://www.suse.com/security/cve/CVE-2011-1020/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1180 page", "url": "https://www.suse.com/security/cve/CVE-2011-1180/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1577 page", "url": "https://www.suse.com/security/cve/CVE-2011-1577/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1581 page", "url": "https://www.suse.com/security/cve/CVE-2011-1581/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2203 page", "url": "https://www.suse.com/security/cve/CVE-2011-2203/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4604 page", "url": "https://www.suse.com/security/cve/CVE-2011-4604/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0056 page", "url": "https://www.suse.com/security/cve/CVE-2012-0056/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3412 page", "url": "https://www.suse.com/security/cve/CVE-2012-3412/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3520 page", "url": "https://www.suse.com/security/cve/CVE-2012-3520/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0160 page", "url": "https://www.suse.com/security/cve/CVE-2013-0160/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0231 page", "url": "https://www.suse.com/security/cve/CVE-2013-0231/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0913 page", "url": "https://www.suse.com/security/cve/CVE-2013-0913/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2850 page", "url": "https://www.suse.com/security/cve/CVE-2013-2850/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0038 page", "url": "https://www.suse.com/security/cve/CVE-2014-0038/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0196 page", "url": "https://www.suse.com/security/cve/CVE-2014-0196/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0691 page", "url": "https://www.suse.com/security/cve/CVE-2014-0691/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8133 page", "url": "https://www.suse.com/security/cve/CVE-2014-8133/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1333 page", "url": "https://www.suse.com/security/cve/CVE-2015-1333/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7550 page", "url": "https://www.suse.com/security/cve/CVE-2015-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7884 page", "url": "https://www.suse.com/security/cve/CVE-2015-7884/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7885 page", "url": "https://www.suse.com/security/cve/CVE-2015-7885/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8660 page", "url": "https://www.suse.com/security/cve/CVE-2015-8660/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0723 page", "url": "https://www.suse.com/security/cve/CVE-2016-0723/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0728 page", "url": "https://www.suse.com/security/cve/CVE-2016-0728/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1237 page", "url": "https://www.suse.com/security/cve/CVE-2016-1237/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2184 page", "url": "https://www.suse.com/security/cve/CVE-2016-2184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2185 page", "url": "https://www.suse.com/security/cve/CVE-2016-2185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2186 page", "url": "https://www.suse.com/security/cve/CVE-2016-2186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2384 page", "url": "https://www.suse.com/security/cve/CVE-2016-2384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3135 page", "url": "https://www.suse.com/security/cve/CVE-2016-3135/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3136 page", "url": "https://www.suse.com/security/cve/CVE-2016-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3140 page", "url": "https://www.suse.com/security/cve/CVE-2016-3140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3689 page", "url": "https://www.suse.com/security/cve/CVE-2016-3689/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3713 page", "url": "https://www.suse.com/security/cve/CVE-2016-3713/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4557 page", "url": "https://www.suse.com/security/cve/CVE-2016-4557/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4558 page", "url": "https://www.suse.com/security/cve/CVE-2016-4558/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4951 page", "url": "https://www.suse.com/security/cve/CVE-2016-4951/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4998 page", "url": "https://www.suse.com/security/cve/CVE-2016-4998/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6187 page", "url": "https://www.suse.com/security/cve/CVE-2016-6187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6516 page", "url": "https://www.suse.com/security/cve/CVE-2016-6516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7039 page", "url": "https://www.suse.com/security/cve/CVE-2016-7039/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9576 page", "url": "https://www.suse.com/security/cve/CVE-2016-9576/" } ], "title": "kernel-debug-4.8.13-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10128-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-4.8.13-1.1.aarch64", "product_id": "kernel-debug-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-base-4.8.13-1.1.aarch64", "product_id": "kernel-debug-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-devel-4.8.13-1.1.aarch64", "product_id": "kernel-debug-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-4.8.13-1.1.aarch64", "product_id": "kernel-default-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-base-4.8.13-1.1.aarch64", "product_id": "kernel-default-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-devel-4.8.13-1.1.aarch64", "product_id": "kernel-default-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-devel-4.8.13-1.1.aarch64", "product_id": "kernel-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-4.8.13-1.1.aarch64", "product_id": "kernel-docs-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-html-4.8.13-1.1.aarch64", "product_id": "kernel-docs-html-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.aarch64", "product_id": "kernel-docs-pdf-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.aarch64", "product": { "name": "kernel-macros-4.8.13-1.1.aarch64", "product_id": "kernel-macros-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.aarch64", "product": { "name": "kernel-obs-build-4.8.13-1.1.aarch64", "product_id": "kernel-obs-build-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.aarch64", "product": { "name": "kernel-obs-qa-4.8.13-1.1.aarch64", "product_id": "kernel-obs-qa-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-4.8.13-1.1.aarch64", "product_id": "kernel-pae-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-base-4.8.13-1.1.aarch64", "product_id": "kernel-pae-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-devel-4.8.13-1.1.aarch64", "product_id": "kernel-pae-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.aarch64", "product": { "name": "kernel-source-4.8.13-1.1.aarch64", "product_id": "kernel-source-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.aarch64", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.aarch64", "product_id": "kernel-source-vanilla-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.aarch64", "product": { "name": "kernel-syms-4.8.13-1.1.aarch64", "product_id": "kernel-syms-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-devel-4.8.13-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-base-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-4.8.13-1.1.ppc64le", "product_id": "kernel-default-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-base-4.8.13-1.1.ppc64le", "product_id": "kernel-default-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-default-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-html-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-html-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-pdf-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.ppc64le", "product": { "name": "kernel-macros-4.8.13-1.1.ppc64le", "product_id": "kernel-macros-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.ppc64le", "product": { "name": "kernel-obs-build-4.8.13-1.1.ppc64le", "product_id": "kernel-obs-build-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.ppc64le", "product": { "name": "kernel-obs-qa-4.8.13-1.1.ppc64le", "product_id": "kernel-obs-qa-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-base-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.ppc64le", "product": { "name": "kernel-source-4.8.13-1.1.ppc64le", "product_id": "kernel-source-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "product_id": "kernel-source-vanilla-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syms-4.8.13-1.1.ppc64le", "product_id": "kernel-syms-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-devel-4.8.13-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-4.8.13-1.1.s390x", "product_id": "kernel-debug-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-base-4.8.13-1.1.s390x", "product_id": "kernel-debug-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-devel-4.8.13-1.1.s390x", "product_id": "kernel-debug-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.s390x", "product": { "name": "kernel-default-4.8.13-1.1.s390x", "product_id": "kernel-default-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.s390x", "product": { "name": "kernel-default-base-4.8.13-1.1.s390x", "product_id": "kernel-default-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-default-devel-4.8.13-1.1.s390x", "product_id": "kernel-default-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-devel-4.8.13-1.1.s390x", "product_id": "kernel-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-4.8.13-1.1.s390x", "product_id": "kernel-docs-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-html-4.8.13-1.1.s390x", "product_id": "kernel-docs-html-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.s390x", "product_id": "kernel-docs-pdf-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.s390x", "product": { "name": "kernel-macros-4.8.13-1.1.s390x", "product_id": "kernel-macros-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.s390x", "product": { "name": "kernel-obs-build-4.8.13-1.1.s390x", "product_id": "kernel-obs-build-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.s390x", "product": { "name": "kernel-obs-qa-4.8.13-1.1.s390x", "product_id": "kernel-obs-qa-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-4.8.13-1.1.s390x", "product_id": "kernel-pae-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-base-4.8.13-1.1.s390x", "product_id": "kernel-pae-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-devel-4.8.13-1.1.s390x", "product_id": "kernel-pae-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.s390x", "product": { "name": "kernel-source-4.8.13-1.1.s390x", "product_id": "kernel-source-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.s390x", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.s390x", "product_id": "kernel-source-vanilla-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.s390x", "product": { "name": "kernel-syms-4.8.13-1.1.s390x", "product_id": "kernel-syms-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-devel-4.8.13-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-4.8.13-1.1.x86_64", "product_id": "kernel-debug-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-base-4.8.13-1.1.x86_64", "product_id": "kernel-debug-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-devel-4.8.13-1.1.x86_64", "product_id": "kernel-debug-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-4.8.13-1.1.x86_64", "product_id": "kernel-default-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-base-4.8.13-1.1.x86_64", "product_id": "kernel-default-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-devel-4.8.13-1.1.x86_64", "product_id": "kernel-default-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-devel-4.8.13-1.1.x86_64", "product_id": "kernel-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-4.8.13-1.1.x86_64", "product_id": "kernel-docs-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-html-4.8.13-1.1.x86_64", "product_id": "kernel-docs-html-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.x86_64", "product_id": "kernel-docs-pdf-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.x86_64", "product": { "name": "kernel-macros-4.8.13-1.1.x86_64", "product_id": "kernel-macros-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.x86_64", "product": { "name": "kernel-obs-build-4.8.13-1.1.x86_64", "product_id": "kernel-obs-build-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.x86_64", "product": { "name": "kernel-obs-qa-4.8.13-1.1.x86_64", "product_id": "kernel-obs-qa-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-4.8.13-1.1.x86_64", "product_id": "kernel-pae-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-base-4.8.13-1.1.x86_64", "product_id": "kernel-pae-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-devel-4.8.13-1.1.x86_64", "product_id": "kernel-pae-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.x86_64", "product": { "name": "kernel-source-4.8.13-1.1.x86_64", "product_id": "kernel-source-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.x86_64", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.x86_64", "product_id": "kernel-source-vanilla-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.x86_64", "product": { "name": "kernel-syms-4.8.13-1.1.x86_64", "product_id": "kernel-syms-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-devel-4.8.13-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-html-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-html-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-html-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-html-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64" }, "product_reference": "kernel-macros-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-macros-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x" }, "product_reference": "kernel-macros-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64" }, "product_reference": "kernel-macros-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64" }, "product_reference": "kernel-obs-build-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-obs-build-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x" }, "product_reference": "kernel-obs-build-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64" }, "product_reference": "kernel-obs-build-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64" }, "product_reference": "kernel-source-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-source-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x" }, "product_reference": "kernel-source-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64" }, "product_reference": "kernel-source-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syms-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syms-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x" }, "product_reference": "kernel-syms-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syms-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3939", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3939" } ], "notes": [ { "category": "general", "text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3939", "url": "https://www.suse.com/security/cve/CVE-2009-3939" }, { "category": "external", "summary": "SUSE Bug 555173 for CVE-2009-3939", "url": "https://bugzilla.suse.com/555173" }, { "category": "external", "summary": "SUSE Bug 557180 for CVE-2009-3939", "url": "https://bugzilla.suse.com/557180" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-3939" }, { "cve": "CVE-2009-4026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4026" } ], "notes": [ { "category": "general", "text": "The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous \"code shuffling patch.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4026", "url": "https://www.suse.com/security/cve/CVE-2009-4026" }, { "category": "external", "summary": "SUSE Bug 558267 for CVE-2009-4026", "url": "https://bugzilla.suse.com/558267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4026" }, { "cve": "CVE-2009-4027", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4027" } ], "notes": [ { "category": "general", "text": "Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4027", "url": "https://www.suse.com/security/cve/CVE-2009-4027" }, { "category": "external", "summary": "SUSE Bug 558267 for CVE-2009-4027", "url": "https://bugzilla.suse.com/558267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4027" }, { "cve": "CVE-2009-4131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4131" } ], "notes": [ { "category": "general", "text": "The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4131", "url": "https://www.suse.com/security/cve/CVE-2009-4131" }, { "category": "external", "summary": "SUSE Bug 561018 for CVE-2009-4131", "url": "https://bugzilla.suse.com/561018" }, { "category": "external", "summary": "SUSE Bug 564380 for CVE-2009-4131", "url": "https://bugzilla.suse.com/564380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4131" }, { "cve": "CVE-2009-4138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4138" } ], "notes": [ { "category": "general", "text": "drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4138", "url": "https://www.suse.com/security/cve/CVE-2009-4138" }, { "category": "external", "summary": "SUSE Bug 564712 for CVE-2009-4138", "url": "https://bugzilla.suse.com/564712" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-4138" }, { "cve": "CVE-2009-4536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4536" } ], "notes": [ { "category": "general", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4536", "url": "https://www.suse.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "SUSE Bug 567376 for CVE-2009-4536", "url": "https://bugzilla.suse.com/567376" }, { "category": "external", "summary": "SUSE Bug 583434 for CVE-2009-4536", "url": "https://bugzilla.suse.com/583434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4536" }, { "cve": "CVE-2009-4538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4538" } ], "notes": [ { "category": "general", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4538", "url": "https://www.suse.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "SUSE Bug 567376 for CVE-2009-4538", "url": "https://bugzilla.suse.com/567376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2009-4538" }, { "cve": "CVE-2010-1146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1146" } ], "notes": [ { "category": "general", "text": "The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1146", "url": "https://www.suse.com/security/cve/CVE-2010-1146" }, { "category": "external", "summary": "SUSE Bug 593906 for CVE-2010-1146", "url": "https://bugzilla.suse.com/593906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1146" }, { "cve": "CVE-2010-1436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1436" } ], "notes": [ { "category": "general", "text": "gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1436", "url": "https://www.suse.com/security/cve/CVE-2010-1436" }, { "category": "external", "summary": "SUSE Bug 599957 for CVE-2010-1436", "url": "https://bugzilla.suse.com/599957" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1436" }, { "cve": "CVE-2010-1641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1641" } ], "notes": [ { "category": "general", "text": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1641", "url": "https://www.suse.com/security/cve/CVE-2010-1641" }, { "category": "external", "summary": "SUSE Bug 608576 for CVE-2010-1641", "url": "https://bugzilla.suse.com/608576" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1641" }, { "cve": "CVE-2010-2066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2066" } ], "notes": [ { "category": "general", "text": "The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2066", "url": "https://www.suse.com/security/cve/CVE-2010-2066" }, { "category": "external", "summary": "SUSE Bug 612457 for CVE-2010-2066", "url": "https://bugzilla.suse.com/612457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2066" }, { "cve": "CVE-2010-2942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2942" } ], "notes": [ { "category": "general", "text": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2942", "url": "https://www.suse.com/security/cve/CVE-2010-2942" }, { "category": "external", "summary": "SUSE Bug 632309 for CVE-2010-2942", "url": "https://bugzilla.suse.com/632309" }, { "category": "external", "summary": "SUSE Bug 642324 for CVE-2010-2942", "url": "https://bugzilla.suse.com/642324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2942" }, { "cve": "CVE-2010-2954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2954" } ], "notes": [ { "category": "general", "text": "The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2954", "url": "https://www.suse.com/security/cve/CVE-2010-2954" }, { "category": "external", "summary": "SUSE Bug 636112 for CVE-2010-2954", "url": "https://bugzilla.suse.com/636112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2954" }, { "cve": "CVE-2010-2955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2955" } ], "notes": [ { "category": "general", "text": "The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2955", "url": "https://www.suse.com/security/cve/CVE-2010-2955" }, { "category": "external", "summary": "SUSE Bug 635413 for CVE-2010-2955", "url": "https://bugzilla.suse.com/635413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2955" }, { "cve": "CVE-2010-3081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3081" } ], "notes": [ { "category": "general", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3081", "url": "https://www.suse.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "SUSE Bug 639709 for CVE-2010-3081", "url": "https://bugzilla.suse.com/639709" }, { "category": "external", "summary": "SUSE Bug 641575 for CVE-2010-3081", "url": "https://bugzilla.suse.com/641575" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2010-3081", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3081" }, { "cve": "CVE-2010-3296", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3296" } ], "notes": [ { "category": "general", "text": "The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3296", "url": "https://www.suse.com/security/cve/CVE-2010-3296" }, { "category": "external", "summary": "SUSE Bug 639481 for CVE-2010-3296", "url": "https://bugzilla.suse.com/639481" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3296", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3296" }, { "cve": "CVE-2010-3297", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3297" } ], "notes": [ { "category": "general", "text": "The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3297", "url": "https://www.suse.com/security/cve/CVE-2010-3297" }, { "category": "external", "summary": "SUSE Bug 639482 for CVE-2010-3297", "url": "https://bugzilla.suse.com/639482" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3297", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3297" }, { "cve": "CVE-2010-3298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3298" } ], "notes": [ { "category": "general", "text": "The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3298", "url": "https://www.suse.com/security/cve/CVE-2010-3298" }, { "category": "external", "summary": "SUSE Bug 639483 for CVE-2010-3298", "url": "https://bugzilla.suse.com/639483" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3298", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3298" }, { "cve": "CVE-2010-3301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3301" } ], "notes": [ { "category": "general", "text": "The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3301", "url": "https://www.suse.com/security/cve/CVE-2010-3301" }, { "category": "external", "summary": "SUSE Bug 639708 for CVE-2010-3301", "url": "https://bugzilla.suse.com/639708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3301" }, { "cve": "CVE-2010-3310", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3310" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3310", "url": "https://www.suse.com/security/cve/CVE-2010-3310" }, { "category": "external", "summary": "SUSE Bug 640721 for CVE-2010-3310", "url": "https://bugzilla.suse.com/640721" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3310" }, { "cve": "CVE-2011-0711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0711" } ], "notes": [ { "category": "general", "text": "The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0711", "url": "https://www.suse.com/security/cve/CVE-2011-0711" }, { "category": "external", "summary": "SUSE Bug 672505 for CVE-2011-0711", "url": "https://bugzilla.suse.com/672505" }, { "category": "external", "summary": "SUSE Bug 672524 for CVE-2011-0711", "url": "https://bugzilla.suse.com/672524" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-0711" }, { "cve": "CVE-2011-0712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0712" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0712", "url": "https://www.suse.com/security/cve/CVE-2011-0712" }, { "category": "external", "summary": "SUSE Bug 672499 for CVE-2011-0712", "url": "https://bugzilla.suse.com/672499" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-0712" }, { "cve": "CVE-2011-1020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1020" } ], "notes": [ { "category": "general", "text": "The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1020", "url": "https://www.suse.com/security/cve/CVE-2011-1020" }, { "category": "external", "summary": "SUSE Bug 674982 for CVE-2011-1020", "url": "https://bugzilla.suse.com/674982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1020" }, { "cve": "CVE-2011-1180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1180" } ], "notes": [ { "category": "general", "text": "Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1180", "url": "https://www.suse.com/security/cve/CVE-2011-1180" }, { "category": "external", "summary": "SUSE Bug 681497 for CVE-2011-1180", "url": "https://bugzilla.suse.com/681497" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-1180" }, { "cve": "CVE-2011-1577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1577" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1577", "url": "https://www.suse.com/security/cve/CVE-2011-1577" }, { "category": "external", "summary": "SUSE Bug 687113 for CVE-2011-1577", "url": "https://bugzilla.suse.com/687113" }, { "category": "external", "summary": "SUSE Bug 692784 for CVE-2011-1577", "url": "https://bugzilla.suse.com/692784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1577" }, { "cve": "CVE-2011-1581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1581" } ], "notes": [ { "category": "general", "text": "The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1581", "url": "https://www.suse.com/security/cve/CVE-2011-1581" }, { "category": "external", "summary": "SUSE Bug 687116 for CVE-2011-1581", "url": "https://bugzilla.suse.com/687116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1581" }, { "cve": "CVE-2011-2203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2203" } ], "notes": [ { "category": "general", "text": "The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2203", "url": "https://www.suse.com/security/cve/CVE-2011-2203" }, { "category": "external", "summary": "SUSE Bug 699709 for CVE-2011-2203", "url": "https://bugzilla.suse.com/699709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-2203" }, { "cve": "CVE-2011-4604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4604" } ], "notes": [ { "category": "general", "text": "The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4604", "url": "https://www.suse.com/security/cve/CVE-2011-4604" }, { "category": "external", "summary": "SUSE Bug 736149 for CVE-2011-4604", "url": "https://bugzilla.suse.com/736149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-4604" }, { "cve": "CVE-2012-0056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0056" } ], "notes": [ { "category": "general", "text": "The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/\u003cpid\u003e/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0056", "url": "https://www.suse.com/security/cve/CVE-2012-0056" }, { "category": "external", "summary": "SUSE Bug 1171985 for CVE-2012-0056", "url": "https://bugzilla.suse.com/1171985" }, { "category": "external", "summary": "SUSE Bug 742028 for CVE-2012-0056", "url": "https://bugzilla.suse.com/742028" }, { "category": "external", "summary": "SUSE Bug 742279 for CVE-2012-0056", "url": "https://bugzilla.suse.com/742279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-0056" }, { "cve": "CVE-2012-3412", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3412" } ], "notes": [ { "category": "general", "text": "The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3412", "url": "https://www.suse.com/security/cve/CVE-2012-3412" }, { "category": "external", "summary": "SUSE Bug 774523 for CVE-2012-3412", "url": "https://bugzilla.suse.com/774523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-3412" }, { "cve": "CVE-2012-3520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3520" } ], "notes": [ { "category": "general", "text": "The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3520", "url": "https://www.suse.com/security/cve/CVE-2012-3520" }, { "category": "external", "summary": "SUSE Bug 776925 for CVE-2012-3520", "url": "https://bugzilla.suse.com/776925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2012-3520" }, { "cve": "CVE-2013-0160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0160" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0160", "url": "https://www.suse.com/security/cve/CVE-2013-0160" }, { "category": "external", "summary": "SUSE Bug 797175 for CVE-2013-0160", "url": "https://bugzilla.suse.com/797175" }, { "category": "external", "summary": "SUSE Bug 841063 for CVE-2013-0160", "url": "https://bugzilla.suse.com/841063" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0160", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0160" }, { "cve": "CVE-2013-0231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0231" } ], "notes": [ { "category": "general", "text": "The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0231", "url": "https://www.suse.com/security/cve/CVE-2013-0231" }, { "category": "external", "summary": "SUSE Bug 801178 for CVE-2013-0231", "url": "https://bugzilla.suse.com/801178" }, { "category": "external", "summary": "SUSE Bug 841063 for CVE-2013-0231", "url": "https://bugzilla.suse.com/841063" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0231", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0231" }, { "cve": "CVE-2013-0913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0913" } ], "notes": [ { "category": "general", "text": "Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0913", "url": "https://www.suse.com/security/cve/CVE-2013-0913" }, { "category": "external", "summary": "SUSE Bug 808829 for CVE-2013-0913", "url": "https://bugzilla.suse.com/808829" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0913", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0913" }, { "cve": "CVE-2013-2850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2850" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2850", "url": "https://www.suse.com/security/cve/CVE-2013-2850" }, { "category": "external", "summary": "SUSE Bug 821560 for CVE-2013-2850", "url": "https://bugzilla.suse.com/821560" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2850" }, { "cve": "CVE-2014-0038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0038" } ], "notes": [ { "category": "general", "text": "The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0038", "url": "https://www.suse.com/security/cve/CVE-2014-0038" }, { "category": "external", "summary": "SUSE Bug 860993 for CVE-2014-0038", "url": "https://bugzilla.suse.com/860993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0038" }, { "cve": "CVE-2014-0196", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0196" } ], "notes": [ { "category": "general", "text": "The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the \"LECHO \u0026 !OPOST\" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0196", "url": "https://www.suse.com/security/cve/CVE-2014-0196" }, { "category": "external", "summary": "SUSE Bug 871252 for CVE-2014-0196", "url": "https://bugzilla.suse.com/871252" }, { "category": "external", "summary": "SUSE Bug 875690 for CVE-2014-0196", "url": "https://bugzilla.suse.com/875690" }, { "category": "external", "summary": "SUSE Bug 877345 for CVE-2014-0196", "url": "https://bugzilla.suse.com/877345" }, { "category": "external", "summary": "SUSE Bug 879878 for CVE-2014-0196", "url": "https://bugzilla.suse.com/879878" }, { "category": "external", "summary": "SUSE Bug 933423 for CVE-2014-0196", "url": "https://bugzilla.suse.com/933423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0196" }, { "cve": "CVE-2014-0691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0691" } ], "notes": [ { "category": "general", "text": "Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0691", "url": "https://www.suse.com/security/cve/CVE-2014-0691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0691" }, { "cve": "CVE-2014-8133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8133" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8133", "url": "https://www.suse.com/security/cve/CVE-2014-8133" }, { "category": "external", "summary": "SUSE Bug 817142 for CVE-2014-8133", "url": "https://bugzilla.suse.com/817142" }, { "category": "external", "summary": "SUSE Bug 906545 for CVE-2014-8133", "url": "https://bugzilla.suse.com/906545" }, { "category": "external", "summary": "SUSE Bug 907818 for CVE-2014-8133", "url": "https://bugzilla.suse.com/907818" }, { "category": "external", "summary": "SUSE Bug 909077 for CVE-2014-8133", "url": "https://bugzilla.suse.com/909077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-8133" }, { "cve": "CVE-2015-1333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1333" } ], "notes": [ { "category": "general", "text": "Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1333", "url": "https://www.suse.com/security/cve/CVE-2015-1333" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-1333", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1185451 for CVE-2015-1333", "url": "https://bugzilla.suse.com/1185451" }, { "category": "external", "summary": "SUSE Bug 938645 for CVE-2015-1333", "url": "https://bugzilla.suse.com/938645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1333" }, { "cve": "CVE-2015-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7550" } ], "notes": [ { "category": "general", "text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7550", "url": "https://www.suse.com/security/cve/CVE-2015-7550" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 958951 for CVE-2015-7550", "url": "https://bugzilla.suse.com/958951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7550" }, { "cve": "CVE-2015-7884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7884" } ], "notes": [ { "category": "general", "text": "The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7884", "url": "https://www.suse.com/security/cve/CVE-2015-7884" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-7884", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 951626 for CVE-2015-7884", "url": "https://bugzilla.suse.com/951626" }, { "category": "external", "summary": "SUSE Bug 951627 for CVE-2015-7884", "url": "https://bugzilla.suse.com/951627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7884" }, { "cve": "CVE-2015-7885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7885" } ], "notes": [ { "category": "general", "text": "The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7885", "url": "https://www.suse.com/security/cve/CVE-2015-7885" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-7885", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 951626 for CVE-2015-7885", "url": "https://bugzilla.suse.com/951626" }, { "category": "external", "summary": "SUSE Bug 951627 for CVE-2015-7885", "url": "https://bugzilla.suse.com/951627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7885" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8660" } ], "notes": [ { "category": "general", "text": "The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8660", "url": "https://www.suse.com/security/cve/CVE-2015-8660" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8660", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 960281 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960281" }, { "category": "external", "summary": "SUSE Bug 960329 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960329" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8660", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8660" }, { "cve": "CVE-2016-0723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0723" } ], "notes": [ { "category": "general", "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0723", "url": "https://www.suse.com/security/cve/CVE-2016-0723" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0723", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961500 for CVE-2016-0723", "url": "https://bugzilla.suse.com/961500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0723" }, { "cve": "CVE-2016-0728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0728" } ], "notes": [ { "category": "general", "text": "The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0728", "url": "https://www.suse.com/security/cve/CVE-2016-0728" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2016-0728", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 962075 for CVE-2016-0728", "url": "https://bugzilla.suse.com/962075" }, { "category": "external", "summary": "SUSE Bug 962078 for CVE-2016-0728", "url": "https://bugzilla.suse.com/962078" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2016-0728", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0728" }, { "cve": "CVE-2016-1237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1237" } ], "notes": [ { "category": "general", "text": "nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1237", "url": "https://www.suse.com/security/cve/CVE-2016-1237" }, { "category": "external", "summary": "SUSE Bug 986570 for CVE-2016-1237", "url": "https://bugzilla.suse.com/986570" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1237" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2184" } ], "notes": [ { "category": "general", "text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2184", "url": "https://www.suse.com/security/cve/CVE-2016-2184" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2184", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971125 for CVE-2016-2184", "url": "https://bugzilla.suse.com/971125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2184" }, { "cve": "CVE-2016-2185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2185" } ], "notes": [ { "category": "general", "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2185", "url": "https://www.suse.com/security/cve/CVE-2016-2185" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2185", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971124 for CVE-2016-2185", "url": "https://bugzilla.suse.com/971124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2185" }, { "cve": "CVE-2016-2186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2186" } ], "notes": [ { "category": "general", "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2186", "url": "https://www.suse.com/security/cve/CVE-2016-2186" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2186", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970958 for CVE-2016-2186", "url": "https://bugzilla.suse.com/970958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2186" }, { "cve": "CVE-2016-2384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2384" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2384", "url": "https://www.suse.com/security/cve/CVE-2016-2384" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2384", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 966693 for CVE-2016-2384", "url": "https://bugzilla.suse.com/966693" }, { "category": "external", "summary": "SUSE Bug 967773 for CVE-2016-2384", "url": "https://bugzilla.suse.com/967773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2384" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3135" } ], "notes": [ { "category": "general", "text": "Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3135", "url": "https://www.suse.com/security/cve/CVE-2016-3135" }, { "category": "external", "summary": "SUSE Bug 970904 for CVE-2016-3135", "url": "https://bugzilla.suse.com/970904" }, { "category": "external", "summary": "SUSE Bug 971794 for CVE-2016-3135", "url": "https://bugzilla.suse.com/971794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3135" }, { "cve": "CVE-2016-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3136" } ], "notes": [ { "category": "general", "text": "The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3136", "url": "https://www.suse.com/security/cve/CVE-2016-3136" }, { "category": "external", "summary": "SUSE Bug 970955 for CVE-2016-3136", "url": "https://bugzilla.suse.com/970955" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3136" }, { "cve": "CVE-2016-3140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3140" } ], "notes": [ { "category": "general", "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3140", "url": "https://www.suse.com/security/cve/CVE-2016-3140" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3140", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970892 for CVE-2016-3140", "url": "https://bugzilla.suse.com/970892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3140" }, { "cve": "CVE-2016-3689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3689" } ], "notes": [ { "category": "general", "text": "The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3689", "url": "https://www.suse.com/security/cve/CVE-2016-3689" }, { "category": "external", "summary": "SUSE Bug 971628 for CVE-2016-3689", "url": "https://bugzilla.suse.com/971628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3689" }, { "cve": "CVE-2016-3713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3713" } ], "notes": [ { "category": "general", "text": "The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3713", "url": "https://www.suse.com/security/cve/CVE-2016-3713" }, { "category": "external", "summary": "SUSE Bug 979715 for CVE-2016-3713", "url": "https://bugzilla.suse.com/979715" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-3713", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3713" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4557" } ], "notes": [ { "category": "general", "text": "The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4557", "url": "https://www.suse.com/security/cve/CVE-2016-4557" }, { "category": "external", "summary": "SUSE Bug 979018 for CVE-2016-4557", "url": "https://bugzilla.suse.com/979018" }, { "category": "external", "summary": "SUSE Bug 979077 for CVE-2016-4557", "url": "https://bugzilla.suse.com/979077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4557" }, { "cve": "CVE-2016-4558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4558" } ], "notes": [ { "category": "general", "text": "The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4558", "url": "https://www.suse.com/security/cve/CVE-2016-4558" }, { "category": "external", "summary": "SUSE Bug 979019 for CVE-2016-4558", "url": "https://bugzilla.suse.com/979019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4558" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4951" } ], "notes": [ { "category": "general", "text": "The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4951", "url": "https://www.suse.com/security/cve/CVE-2016-4951" }, { "category": "external", "summary": "SUSE Bug 981058 for CVE-2016-4951", "url": "https://bugzilla.suse.com/981058" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4951", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4951" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-4998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4998" } ], "notes": [ { "category": "general", "text": "The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4998", "url": "https://www.suse.com/security/cve/CVE-2016-4998" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4998", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4998", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4998", "url": "https://bugzilla.suse.com/986365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4998" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6187" } ], "notes": [ { "category": "general", "text": "The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6187", "url": "https://www.suse.com/security/cve/CVE-2016-6187" }, { "category": "external", "summary": "SUSE Bug 988307 for CVE-2016-6187", "url": "https://bugzilla.suse.com/988307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-6187" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6516" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6516", "url": "https://www.suse.com/security/cve/CVE-2016-6516" }, { "category": "external", "summary": "SUSE Bug 991604 for CVE-2016-6516", "url": "https://bugzilla.suse.com/991604" }, { "category": "external", "summary": "SUSE Bug 991669 for CVE-2016-6516", "url": "https://bugzilla.suse.com/991669" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6516" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7039" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7039", "url": "https://www.suse.com/security/cve/CVE-2016-7039" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7039" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9576" } ], "notes": [ { "category": "general", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9576", "url": "https://www.suse.com/security/cve/CVE-2016-9576" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1019668 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019668" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9576" } ] }
rhsa-2017:0307
Vulnerability from csaf_redhat
Published
2017-02-23 17:35
Modified
2025-08-03 16:00
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* When creating audit records for parameters to executed children processes, an attacker can convince the Linux kernel audit subsystem can create corrupt records which may allow an attacker to misrepresent or evade logging of executing commands. (CVE-2016-6136, Moderate)
* A flaw was found in the Linux kernel's implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555, Moderate)
Bug Fix(es):
* The qlnic driver previously attempted to fetch pending transmission descriptors before all writes were complete, which lead to firmware hangs. With this update, the qlcnic driver has been fixed to complete all writes before the hardware fetches any pending transmission descriptors. As a result, the firmware no longer hangs with the qlcnic driver. (BZ#1403143)
* Previously, when a NFS share was mounted, the file-system (FS) cache was incorrectly enabled even when the "-o fsc" option was not used in the mount command. Consequently, the cachefilesd service stored files in the NFS share even when not instructed to by the user. With this update, NFS does not use the FS cache if not instructed by the "-o fsc" option. As a result, NFS no longer enables caching if the "-o fsc" option is not used. (BZ#1399172)
* Previously, an NFS client and NFS server got into a NFS4 protocol loop involving a WRITE action and a NFS4ERR_EXPIRED response when the current_fileid counter got to the wraparound point by overflowing the value of 32 bits. This update fixes the NFS server to handle the current_fileid wraparound. As a result, the described NFS4 protocol loop no longer occurs. (BZ#1399174)
* Previously, certain configurations of the Hewlett Packard Smart Array (HPSA) devices caused hardware to be set offline incorrectly when the HPSA driver was expected to wait for existing I/O operations to complete. Consequently, a kernel panic occurred. This update prevents the described problem. As a result, the kernel panic no longer occurs. (BZ#1399175)
* Previously, memory corruption by copying data into the wrong memory locations sometimes occurred, because the __copy_tofrom_user() function was returning incorrect values. This update fixes the __copy_tofrom_user() function so that it no longer returns larger values than the number of bytes it was asked to copy. As a result, memory corruption no longer occurs in he described scenario. (BZ#1398185)
* Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in some cases rebooted during the graceful node failover test, because the host kept sending heartbeat packets independently of guests responding to them. This update fixes the bug by properly responding to all the heartbeat messages in the queue, even if they are pending. As a result, guest VMs no longer get rebooted under the described circumstances. (BZ#1397739)
* When the "punching hole" feature of the fallocate utility was used on an ext4 file system inode with extent depth of 1, the extent tree of the inode sometimes became corrupted. With this update, the underlying source code has been fixed, and extent tree corruption no longer occurs in the described situation. (BZ#1397808)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* When creating audit records for parameters to executed children processes, an attacker can convince the Linux kernel audit subsystem can create corrupt records which may allow an attacker to misrepresent or evade logging of executing commands. (CVE-2016-6136, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555, Moderate)\n\nBug Fix(es):\n\n* The qlnic driver previously attempted to fetch pending transmission descriptors before all writes were complete, which lead to firmware hangs. With this update, the qlcnic driver has been fixed to complete all writes before the hardware fetches any pending transmission descriptors. As a result, the firmware no longer hangs with the qlcnic driver. (BZ#1403143)\n\n* Previously, when a NFS share was mounted, the file-system (FS) cache was incorrectly enabled even when the \"-o fsc\" option was not used in the mount command. Consequently, the cachefilesd service stored files in the NFS share even when not instructed to by the user. With this update, NFS does not use the FS cache if not instructed by the \"-o fsc\" option. As a result, NFS no longer enables caching if the \"-o fsc\" option is not used. (BZ#1399172)\n\n* Previously, an NFS client and NFS server got into a NFS4 protocol loop involving a WRITE action and a NFS4ERR_EXPIRED response when the current_fileid counter got to the wraparound point by overflowing the value of 32 bits. This update fixes the NFS server to handle the current_fileid wraparound. As a result, the described NFS4 protocol loop no longer occurs. (BZ#1399174)\n\n* Previously, certain configurations of the Hewlett Packard Smart Array (HPSA) devices caused hardware to be set offline incorrectly when the HPSA driver was expected to wait for existing I/O operations to complete. Consequently, a kernel panic occurred. This update prevents the described problem. As a result, the kernel panic no longer occurs. (BZ#1399175)\n\n* Previously, memory corruption by copying data into the wrong memory locations sometimes occurred, because the __copy_tofrom_user() function was returning incorrect values. This update fixes the __copy_tofrom_user() function so that it no longer returns larger values than the number of bytes it was asked to copy. As a result, memory corruption no longer occurs in he described scenario. (BZ#1398185)\n\n* Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in some cases rebooted during the graceful node failover test, because the host kept sending heartbeat packets independently of guests responding to them. This update fixes the bug by properly responding to all the heartbeat messages in the queue, even if they are pending. As a result, guest VMs no longer get rebooted under the described circumstances. (BZ#1397739)\n\n* When the \"punching hole\" feature of the fallocate utility was used on an ext4 file system inode with extent depth of 1, the extent tree of the inode sometimes became corrupted. With this update, the underlying source code has been fixed, and extent tree corruption no longer occurs in the described situation. (BZ#1397808)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0307", "url": "https://access.redhat.com/errata/RHSA-2017:0307" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1353533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353533" }, { "category": "external", "summary": "1397930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0307.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T16:00:54+00:00", "generator": { "date": "2025-08-03T16:00:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:0307", "initial_release_date": "2017-02-23T17:35:46+00:00", "revision_history": [ { "date": "2017-02-23T17:35:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-02-23T17:35:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T16:00:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-642.15.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-642.15.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-642.15.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64", "product_id": "perf-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64", "product_id": "kernel-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.15.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.15.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.15.1.el6.i686", "product": { "name": "perf-0:2.6.32-642.15.1.el6.i686", "product_id": "perf-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.15.1.el6.i686", "product": { "name": "kernel-0:2.6.32-642.15.1.el6.i686", "product_id": "kernel-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.15.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.15.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686", "product_id": "python-perf-0:2.6.32-642.15.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.15.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-642.15.1.el6.src", "product": { "name": "kernel-0:2.6.32-642.15.1.el6.src", "product_id": "kernel-0:2.6.32-642.15.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.15.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64", "product_id": "perf-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.15.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.15.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x", "product_id": "python-perf-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "perf-0:2.6.32-642.15.1.el6.s390x", "product_id": "perf-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.15.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.15.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6136", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2016-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1353533" } ], "notes": [ { "category": "description", "text": "When creating audit records for parameters to executed children processes, an attacker can convince the Linux kernel audit subsystem can create corrupt records which may allow an attacker to misrepresent or evade logging of executing commands.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition vulnerability in execve argv arguments", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and 7. This has been rated as having Moderate security impact and is planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6136" }, { "category": "external", "summary": "RHBZ#1353533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6136", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6136" } ], "release_date": "2016-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-23T17:35:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:0307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition vulnerability in execve argv arguments" }, { "cve": "CVE-2016-9555", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397930" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Slab out-of-bounds access in sctp_sf_ootb()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and will be addressed in future updates.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "RHBZ#1397930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9555", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555" } ], "release_date": "2016-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-23T17:35:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:0307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.15.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.15.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.15.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Slab out-of-bounds access in sctp_sf_ootb()" } ] }
rhsa-2017:0113
Vulnerability from csaf_redhat
Published
2017-01-17 17:47
Modified
2025-08-03 15:59
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
The kernel-rt packages have been upgraded to version 3.10.0-514, which provides a number of security and bug fixes over the previous version. (BZ#1400193)
Security Fix(es):
* A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)
* A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate)
* A flaw was found in the Linux kernel's implementation of sctp protocol in which a remote attacker can trigger an out of bounds read with an offset of up to 64kB. This may panic the machine with a page-fault. (CVE-2016-9555, Moderate)
Bug Fix(es):
* Previously, console warnings from the real-time kernel were generated when a sleeping lock was acquired in atomic context. With this update, the code has been modified to not acquire a sleeping lock in this context. As a result, the console warnings are no longer generated. (BZ#1378982)
* Previously, the device mapper (DM) subsystem was not notified that the real-time kernel changes the way preemption works with spinlocks. This caused a kernel panic when the dm-multipath kernel module was loaded because the interrupt request (IRQ) check was invalid on the real-time kernel. This check has been corrected enabling the system to boot correctly with the dm-multipath module enabled. (BZ#1400305)
* Previously, the kernel could sometimes panic due to a possible division by zero in the scheduler. This bug has been fixed by defining a new div64_ul() division function and correcting the affected calculation in the proc_sched_show_task() function. (BZ#1400975)
* Unlike the standard Linux kernel, the real-time kernel does not disable interrupts inside the Interrupt Service Routines driver. Because of this difference, a New API (NAPI) function for turning interrupt requests (IRQ) off was actually being called with IRQs enabled. Consequently, the NAPI poll list was being corrupted, causing improper networking card operation and potential kernel hangs. With this update, the NAPI function has been corrected to force modifications of the poll list to be protected allowing proper operation of the networking card drivers. (BZ#1401779)
Enhancement(s):
* With this update, the CONFIG_SLUB_DEBUG and CONFIG_SLABINFO kernel configuration options are enabled in the real-time kernel. These options turn on SLUB allocator debugging and slab information tracking, which are helpful when investigating kernel memory allocation problems. (BZ#1357997)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nThe kernel-rt packages have been upgraded to version 3.10.0-514, which provides a number of security and bug fixes over the previous version. (BZ#1400193)\n\nSecurity Fix(es):\n\n* A use-after-free vulnerability was found in the kernel\u0027s socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)\n\n* A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s implementation of sctp protocol in which a remote attacker can trigger an out of bounds read with an offset of up to 64kB. This may panic the machine with a page-fault. (CVE-2016-9555, Moderate)\n\nBug Fix(es):\n\n* Previously, console warnings from the real-time kernel were generated when a sleeping lock was acquired in atomic context. With this update, the code has been modified to not acquire a sleeping lock in this context. As a result, the console warnings are no longer generated. (BZ#1378982)\n\n* Previously, the device mapper (DM) subsystem was not notified that the real-time kernel changes the way preemption works with spinlocks. This caused a kernel panic when the dm-multipath kernel module was loaded because the interrupt request (IRQ) check was invalid on the real-time kernel. This check has been corrected enabling the system to boot correctly with the dm-multipath module enabled. (BZ#1400305)\n\n* Previously, the kernel could sometimes panic due to a possible division by zero in the scheduler. This bug has been fixed by defining a new div64_ul() division function and correcting the affected calculation in the proc_sched_show_task() function. (BZ#1400975)\n\n* Unlike the standard Linux kernel, the real-time kernel does not disable interrupts inside the Interrupt Service Routines driver. Because of this difference, a New API (NAPI) function for turning interrupt requests (IRQ) off was actually being called with IRQs enabled. Consequently, the NAPI poll list was being corrupted, causing improper networking card operation and potential kernel hangs. With this update, the NAPI function has been corrected to force modifications of the poll list to be protected allowing proper operation of the networking card drivers. (BZ#1401779)\n\nEnhancement(s):\n\n* With this update, the CONFIG_SLUB_DEBUG and CONFIG_SLABINFO kernel configuration options are enabled in the real-time kernel. These options turn on SLUB allocator debugging and slab information tracking, which are helpful when investigating kernel memory allocation problems. (BZ#1357997)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0113", "url": "https://access.redhat.com/errata/RHSA-2017:0113" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1346444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346444" }, { "category": "external", "summary": "1357997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357997" }, { "category": "external", "summary": "1378982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378982" }, { "category": "external", "summary": "1382268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382268" }, { "category": "external", "summary": "1397930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "category": "external", "summary": "1400193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400193" }, { "category": "external", "summary": "1367091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367091" }, { "category": "external", "summary": "1400305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400305" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0113.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T15:59:42+00:00", "generator": { "date": "2025-08-03T15:59:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:0113", "initial_release_date": "2017-01-17T17:47:44+00:00", "revision_history": [ { "date": "2017-01-17T17:47:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-01-17T17:47:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T15:59:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-514.rt56.210.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "product_id": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.rt56.210.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-514.rt56.210.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-514.rt56.210.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6828", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-08-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367091" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use after free in tcp_xmit_retransmit_queue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "RHBZ#1367091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6828", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6828" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6828", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6828" } ], "release_date": "2016-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:47:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0113" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use after free in tcp_xmit_retransmit_queue" }, { "cve": "CVE-2016-7117", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1382268" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the kernel\u0027s socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in the recvmmsg exit path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and may be addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "RHBZ#1382268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382268" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7117", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7117" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7117", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7117" } ], "release_date": "2016-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:47:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0113" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use-after-free in the recvmmsg exit path" }, { "cve": "CVE-2016-9555", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397930" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Slab out-of-bounds access in sctp_sf_ootb()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and will be addressed in future updates.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "RHBZ#1397930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9555", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555" } ], "release_date": "2016-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:47:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0113" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Slab out-of-bounds access in sctp_sf_ootb()" }, { "cve": "CVE-2017-13167", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2017-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568821" } ], "notes": [ { "category": "description", "text": "A race condition was found in the Linux kernel\u0027s sound timer code in the snd_timer_user_read() function in the sound/core/timer.c file. An unprivileged attacker can exploit the race condition to cause an out-of-bound access which may lead to a system crash or other unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sound: a race condition in the kernel sound timer in snd_timer_user_read()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13167" }, { "category": "external", "summary": "RHBZ#1568821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13167" } ], "release_date": "2016-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:47:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0113" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: sound: a race condition in the kernel sound timer in snd_timer_user_read()" } ] }
rhsa-2017:0091
Vulnerability from csaf_redhat
Published
2017-01-17 17:56
Modified
2025-08-03 15:59
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)
* A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate)
* A flaw was found in the Linux kernel's implementation of sctp protocol in which a remote attacker can trigger an out of bounds read with an offset of up to 64kB. This may panic the machine with a page-fault. (CVE-2016-9555, Moderate)
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-514.6.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1401863)
* Previously, the device mapper (DM) subsystem was not notified that the real-time kernel changes the way preemption works with spinlocks. This caused a kernel panic when the dm-multipath kernel module was loaded because the interrupt request (IRQ) check was invalid on the real-time kernel. This check has been corrected enabling the system to boot correctly with the dm-multipath module enabled. (BZ#1400930)
* Unlike the standard Linux kernel, the real-time kernel does not disable interrupts inside the Interrupt Service Routines driver. Because of this difference, a New API (NAPI) function for turning interrupt requests (IRQ) off was actually being called with IRQs enabled. Consequently, the NAPI poll list was being corrupted, causing improper networking card operation and potential kernel hangs. With this update, the NAPI function has been corrected to force modifications of the poll list to be protected allowing proper operation of the networking card drivers. (BZ#1402837)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A use-after-free vulnerability was found in the kernel\u0027s socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)\n\n* A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s implementation of sctp protocol in which a remote attacker can trigger an out of bounds read with an offset of up to 64kB. This may panic the machine with a page-fault. (CVE-2016-9555, Moderate)\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-514.6.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1401863)\n\n* Previously, the device mapper (DM) subsystem was not notified that the real-time kernel changes the way preemption works with spinlocks. This caused a kernel panic when the dm-multipath kernel module was loaded because the interrupt request (IRQ) check was invalid on the real-time kernel. This check has been corrected enabling the system to boot correctly with the dm-multipath module enabled. (BZ#1400930)\n\n* Unlike the standard Linux kernel, the real-time kernel does not disable interrupts inside the Interrupt Service Routines driver. Because of this difference, a New API (NAPI) function for turning interrupt requests (IRQ) off was actually being called with IRQs enabled. Consequently, the NAPI poll list was being corrupted, causing improper networking card operation and potential kernel hangs. With this update, the NAPI function has been corrected to force modifications of the poll list to be protected allowing proper operation of the networking card drivers. (BZ#1402837)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0091", "url": "https://access.redhat.com/errata/RHSA-2017:0091" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html" }, { "category": "external", "summary": "1367091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367091" }, { "category": "external", "summary": "1382268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382268" }, { "category": "external", "summary": "1397930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "category": "external", "summary": "1400930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400930" }, { "category": "external", "summary": "1401863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401863" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0091.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T15:59:37+00:00", "generator": { "date": "2025-08-03T15:59:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:0091", "initial_release_date": "2017-01-17T17:56:06+00:00", "revision_history": [ { "date": "2017-01-17T17:56:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-01-17T17:56:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T15:59:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-514.6.1.rt56.429.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-514.6.1.rt56.429.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "product": { "name": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "product_id": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.6.1.rt56.429.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6828", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-08-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367091" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use after free in tcp_xmit_retransmit_queue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "RHBZ#1367091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6828", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6828" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6828", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6828" } ], "release_date": "2016-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:56:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0091" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use after free in tcp_xmit_retransmit_queue" }, { "cve": "CVE-2016-7117", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1382268" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the kernel\u0027s socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in the recvmmsg exit path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and may be addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "RHBZ#1382268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382268" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7117", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7117" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7117", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7117" } ], "release_date": "2016-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:56:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0091" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use-after-free in the recvmmsg exit path" }, { "cve": "CVE-2016-9555", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397930" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Slab out-of-bounds access in sctp_sf_ootb()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and will be addressed in future updates.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "RHBZ#1397930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9555", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555" } ], "release_date": "2016-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:56:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0091" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.6.1.rt56.429.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.6.1.rt56.429.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.6.1.rt56.429.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Slab out-of-bounds access in sctp_sf_ootb()" } ] }
rhsa-2017:0086
Vulnerability from csaf_redhat
Published
2017-01-17 17:54
Modified
2025-08-03 15:59
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
These updated kernel packages include several security issues and numerous bug fixes, some of which you can see below. Space precludes documenting all of these bug fixes in this advisory. To see the complete list of bug fixes, users are directed to the related Knowledge Article: https://access.redhat.com/articles/2857831.
Security Fix(es):
* A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)
* A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate)
* A flaw was found in the Linux kernel's implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555, Moderate)
Bug Fix(es):
* Previously, the performance of Internet Protocol over InfiniBand (IPoIB) was suboptimal due to a conflict of IPoIB with the Generic Receive Offload (GRO) infrastructure. With this update, the data cached by the IPoIB driver has been moved from a control block into the IPoIB hard header, thus avoiding the GRO problem and the corruption of IPoIB address information. As a result, the performance of IPoIB has been improved. (BZ#1390668)
* Previously, when a virtual machine (VM) with PCI-Passthrough interfaces was recreated, a race condition between the eventfd daemon and the virqfd daemon occurred. Consequently, the operating system rebooted. This update fixes the race condition. As a result, the operating system no longer reboots in the described situation. (BZ#1391611)
* Previously, a packet loss occurred when the team driver in round-robin mode was sending a large number of packets. This update fixes counting of the packets in the round-robin runner of the team driver, and the packet loss no longer occurs in the described situation. (BZ#1392023)
* Previously, the virtual network devices contained in the deleted namespace could be deleted in any order. If the loopback device was not deleted as the last item, other netns devices, such as vxlan devices, could end up with dangling references to the loopback device. Consequently, deleting a network namespace (netns) occasionally ended by a kernel oops. With this update, the underlying source code has been fixed to ensure the correct order when deleting the virtual network devices on netns deletion. As a result, the kernel oops no longer occurs under the described circumstances. (BZ#1392024)
* Previously, a Kabylake system with a Sunrise Point Platform Controller Hub (PCH) with a PCI device ID of 0xA149 showed the following warning messages during the boot:
"Unknown Intel PCH (0xa149) detected."
"Warning: Intel Kabylake processor with unknown PCH - this hardware has not undergone testing by Red Hat and might not be certified. Please consult https://hardware.redhat.com for certified hardware."
The messages were shown because this PCH was not properly recognized. With this update, the problem has been fixed, and the operating system now boots without displaying the warning messages. (BZ#1392033)
* Previously, the operating system occasionally became unresponsive after a long run. This was caused by a race condition between the try_to_wake_up() function and a woken up task in the core scheduler. With this update, the race condition has been fixed, and the operating system no longer locks up in the described scenario. (BZ#1393719)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nThese updated kernel packages include several security issues and numerous bug fixes, some of which you can see below. Space precludes documenting all of these bug fixes in this advisory. To see the complete list of bug fixes, users are directed to the related Knowledge Article: https://access.redhat.com/articles/2857831.\n\nSecurity Fix(es):\n\n* A use-after-free vulnerability was found in the kernel\u0027s socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)\n\n* A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555, Moderate)\n\nBug Fix(es):\n\n* Previously, the performance of Internet Protocol over InfiniBand (IPoIB) was suboptimal due to a conflict of IPoIB with the Generic Receive Offload (GRO) infrastructure. With this update, the data cached by the IPoIB driver has been moved from a control block into the IPoIB hard header, thus avoiding the GRO problem and the corruption of IPoIB address information. As a result, the performance of IPoIB has been improved. (BZ#1390668)\n\n* Previously, when a virtual machine (VM) with PCI-Passthrough interfaces was recreated, a race condition between the eventfd daemon and the virqfd daemon occurred. Consequently, the operating system rebooted. This update fixes the race condition. As a result, the operating system no longer reboots in the described situation. (BZ#1391611)\n\n* Previously, a packet loss occurred when the team driver in round-robin mode was sending a large number of packets. This update fixes counting of the packets in the round-robin runner of the team driver, and the packet loss no longer occurs in the described situation. (BZ#1392023)\n\n* Previously, the virtual network devices contained in the deleted namespace could be deleted in any order. If the loopback device was not deleted as the last item, other netns devices, such as vxlan devices, could end up with dangling references to the loopback device. Consequently, deleting a network namespace (netns) occasionally ended by a kernel oops. With this update, the underlying source code has been fixed to ensure the correct order when deleting the virtual network devices on netns deletion. As a result, the kernel oops no longer occurs under the described circumstances. (BZ#1392024)\n\n* Previously, a Kabylake system with a Sunrise Point Platform Controller Hub (PCH) with a PCI device ID of 0xA149 showed the following warning messages during the boot:\n\n \"Unknown Intel PCH (0xa149) detected.\"\n \"Warning: Intel Kabylake processor with unknown PCH - this hardware has not undergone testing by Red Hat and might not be certified. Please consult https://hardware.redhat.com for certified hardware.\"\n\nThe messages were shown because this PCH was not properly recognized. With this update, the problem has been fixed, and the operating system now boots without displaying the warning messages. (BZ#1392033)\n\n* Previously, the operating system occasionally became unresponsive after a long run. This was caused by a race condition between the try_to_wake_up() function and a woken up task in the core scheduler. With this update, the race condition has been fixed, and the operating system no longer locks up in the described scenario. (BZ#1393719)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0086", "url": "https://access.redhat.com/errata/RHSA-2017:0086" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/2857831", "url": "https://access.redhat.com/articles/2857831" }, { "category": "external", "summary": "1367091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367091" }, { "category": "external", "summary": "1382268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382268" }, { "category": "external", "summary": "1397930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0086.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-03T15:59:16+00:00", "generator": { "date": "2025-08-03T15:59:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:0086", "initial_release_date": "2017-01-17T17:54:28+00:00", "revision_history": [ { "date": "2017-01-17T17:54:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-01-17T17:54:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T15:59:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64", "product_id": "perf-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.6.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.6.1.el7.src", "product": { "name": "kernel-0:3.10.0-514.6.1.el7.src", "product_id": "kernel-0:3.10.0-514.6.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.6.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.6.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.6.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64", "product_id": "perf-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.6.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "perf-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.6.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x", "product_id": "python-perf-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "perf-0:3.10.0-514.6.1.el7.s390x", "product_id": "perf-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.6.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.src", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.src", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.src", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.src", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.6.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.6.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-6828", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-08-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367091" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use after free in tcp_xmit_retransmit_queue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "RHBZ#1367091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6828", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6828" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6828", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6828" } ], "release_date": "2016-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:54:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:0086" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use after free in tcp_xmit_retransmit_queue" }, { "cve": "CVE-2016-7117", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1382268" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the kernel\u0027s socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in the recvmmsg exit path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and may be addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "RHBZ#1382268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382268" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7117", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7117" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7117", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7117" } ], "release_date": "2016-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:54:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:0086" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use-after-free in the recvmmsg exit path" }, { "cve": "CVE-2016-9555", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1397930" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Slab out-of-bounds access in sctp_sf_ootb()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and will be addressed in future updates.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "RHBZ#1397930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9555", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555" } ], "release_date": "2016-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-17T17:54:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:0086" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.6.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.6.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.6.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Slab out-of-bounds access in sctp_sf_ootb()" } ] }
gsd-2016-9555
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-9555", "description": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "id": "GSD-2016-9555", "references": [ "https://www.suse.com/security/cve/CVE-2016-9555.html", "https://access.redhat.com/errata/RHSA-2017:0307", "https://access.redhat.com/errata/RHSA-2017:0113", "https://access.redhat.com/errata/RHSA-2017:0091", "https://access.redhat.com/errata/RHSA-2017:0086", "https://ubuntu.com/security/CVE-2016-9555", "https://linux.oracle.com/cve/CVE-2016-9555.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-9555" ], "details": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "id": "GSD-2016-9555", "modified": "2023-12-13T01:21:21.151103Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-9555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2016:3096", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa134", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "name": "SUSE-SU-2016:3206", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" }, { "name": "SUSE-SU-2016:3169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" }, { "name": "1037339", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037339" }, { "name": "SUSE-SU-2016:3117", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" }, { "name": "SUSE-SU-2016:3197", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" }, { "name": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "name": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk" }, { "name": "RHSA-2017:0086", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html" }, { "name": "RHSA-2017:0113", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html" }, { "name": "RHSA-2017:0091", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html" }, { "name": "94479", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94479" }, { "name": "SUSE-SU-2016:3247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" }, { "name": "[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/11/22/18" }, { "name": "SUSE-SU-2016:3183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "name": "SUSE-SU-2016:3116", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" }, { "name": "SUSE-SU-2016:3113", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" }, { "name": "RHSA-2017:0307", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html" }, { "name": "SUSE-SU-2016:3205", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.85", "versionStartIncluding": "3.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.10.105", "versionStartIncluding": "3.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.12.68", "versionStartIncluding": "3.11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.16.40", "versionStartIncluding": "3.13", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.18.49", "versionStartIncluding": "3.17", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.32", "versionStartIncluding": "3.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.8.8", "versionStartIncluding": "4.5.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-9555" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/22/18" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "name": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8" }, { "name": "94479", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94479" }, { "name": "1037339", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037339" }, { "name": "https://bto.bluecoat.com/security-advisory/sa134", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "name": "SUSE-SU-2016:3247", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" }, { "name": "SUSE-SU-2016:3206", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" }, { "name": "SUSE-SU-2016:3205", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" }, { "name": "SUSE-SU-2016:3197", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" }, { "name": "SUSE-SU-2016:3183", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" }, { "name": "SUSE-SU-2016:3169", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" }, { "name": "SUSE-SU-2016:3117", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" }, { "name": "SUSE-SU-2016:3116", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" }, { "name": "SUSE-SU-2016:3113", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" }, { "name": "SUSE-SU-2016:3096", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" }, { "name": "RHSA-2017:0307", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html" }, { "name": "RHSA-2017:0113", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html" }, { "name": "RHSA-2017:0091", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html" }, { "name": "RHSA-2017:0086", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html" }, { "name": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-19T16:13Z", "publishedDate": "2016-11-28T03:59Z" } } }
ghsa-x329-xh53-wmqc
Vulnerability from github
Published
2022-05-14 03:07
Modified
2025-04-12 13:06
Severity ?
VLAI Severity ?
Details
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
{ "affected": [], "aliases": [ "CVE-2016-9555" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-11-28T03:59:00Z", "severity": "CRITICAL" }, "details": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "id": "GHSA-x329-xh53-wmqc", "modified": "2025-04-12T13:06:51Z", "published": "2022-05-14T03:07:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9555" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "type": "WEB", "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397930" }, { "type": "WEB", "url": "https://groups.google.com/forum/#!topic/syzkaller/pAUcHsUJbjk" }, { "type": "WEB", "url": "https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0086.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0091.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0113.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0307.html" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/11/22/18" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/94479" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037339" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…