Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-17741 (GCVE-0-2017-17741)
Vulnerability from cvelistv5
Published
2017-12-18 08:00
Modified
2024-08-05 20:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:59:17.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "DSA-4082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4082" }, { "name": "USN-3617-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "name": "USN-3632-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "102227", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102227" }, { "name": "USN-3620-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3620-2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.spinics.net/lists/kvm/msg160796.html" }, { "name": "DSA-4073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4073" }, { "name": "USN-3617-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "USN-3620-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3620-1/" }, { "name": "USN-3619-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3619-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-24T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "DSA-4082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4082" }, { "name": "USN-3617-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "name": "USN-3632-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "102227", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102227" }, { "name": "USN-3620-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3620-2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.spinics.net/lists/kvm/msg160796.html" }, { "name": "DSA-4073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4073" }, { "name": "USN-3617-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "USN-3620-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3620-1/" }, { "name": "USN-3619-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3619-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3617-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "DSA-4082", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "102227", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102227" }, { "name": "USN-3620-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3620-2/" }, { "name": "https://www.spinics.net/lists/kvm/msg160796.html", "refsource": "MISC", "url": "https://www.spinics.net/lists/kvm/msg160796.html" }, { "name": "DSA-4073", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4073" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "USN-3620-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3620-1/" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-17741", "datePublished": "2017-12-18T08:00:00", "dateReserved": "2017-12-18T00:00:00", "dateUpdated": "2024-08-05T20:59:17.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-17741\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-12-18T08:29:00.210\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n KVM en el kernel de Linux hasta la versi\u00f3n 4.14.7 permite que atacantes remotos obtengan informaci\u00f3n potencialmente sensible de la memoria del kernel. Esto tambi\u00e9n se conoce como una lectura fuera de l\u00edmites basada en pila write_mmio y est\u00e1 relacionado con arch/x86/kvm/x86.c e include/trace/events/kvm.h.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.0,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.14.7\",\"matchCriteriaId\":\"CCF53DC7-5CFD-4A54-AABC-71D623665F85\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/102227\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3617-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3617-2/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3617-3/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3619-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3619-2/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3620-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3620-2/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3632-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2017/dsa-4073\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4082\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.spinics.net/lists/kvm/msg160796.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/102227\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3617-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3617-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3617-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3619-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3619-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3620-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3620-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3632-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2017/dsa-4073\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.spinics.net/lists/kvm/msg160796.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
fkie_cve-2017-17741
Vulnerability from fkie_nvd
Published
2017-12-18 08:29
Modified
2025-04-20 01:37
Severity ?
Summary
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/102227 | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html | ||
cve@mitre.org | https://usn.ubuntu.com/3617-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/3617-2/ | ||
cve@mitre.org | https://usn.ubuntu.com/3617-3/ | ||
cve@mitre.org | https://usn.ubuntu.com/3619-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/3619-2/ | ||
cve@mitre.org | https://usn.ubuntu.com/3620-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/3620-2/ | ||
cve@mitre.org | https://usn.ubuntu.com/3632-1/ | ||
cve@mitre.org | https://www.debian.org/security/2017/dsa-4073 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4082 | ||
cve@mitre.org | https://www.spinics.net/lists/kvm/msg160796.html | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102227 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3617-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3617-2/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3617-3/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3619-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3619-2/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3620-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3620-2/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3632-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-4073 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4082 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.spinics.net/lists/kvm/msg160796.html | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCF53DC7-5CFD-4A54-AABC-71D623665F85", "versionEndIncluding": "4.14.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h." }, { "lang": "es", "value": "La implementaci\u00f3n KVM en el kernel de Linux hasta la versi\u00f3n 4.14.7 permite que atacantes remotos obtengan informaci\u00f3n potencialmente sensible de la memoria del kernel. Esto tambi\u00e9n se conoce como una lectura fuera de l\u00edmites basada en pila write_mmio y est\u00e1 relacionado con arch/x86/kvm/x86.c e include/trace/events/kvm.h." } ], "id": "CVE-2017-17741", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-18T08:29:00.210", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/102227" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3617-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3617-2/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3617-3/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3619-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3619-2/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3620-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3620-2/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/3632-1/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4073" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://www.spinics.net/lists/kvm/msg160796.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/102227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3617-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3617-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3617-3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3619-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3619-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3620-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3620-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3632-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://www.spinics.net/lists/kvm/msg160796.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2019:1287-1
Vulnerability from csaf_suse
Published
2019-05-17 13:47
Modified
2019-05-17 13:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)
- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.
For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736
The following security bugs were fixed:
- CVE-2018-1128: It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network could use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. (bnc#1096748).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. (bnc#1096748).
- CVE-2016-8636: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c allowed local users to cause a denial of service (memory corruption), obtain sensitive information or possibly have unspecified other impact via a write or read request involving the 'RDMA protocol over infiniband' (aka Soft RoCE) technology (bnc#1024908).
- CVE-2017-18174: In the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).
- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c has multiple race conditions (bnc#1133188).
- CVE-2019-3882: A flaw was found in the vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS) (bsc#1131427).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2017-17741: The KVM implementation allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2019-9503, CVE-2019-8564: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828, bnc#1132673).
The following non-security bugs were fixed:
- ACPI: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- add mainline tags to four hyperv patches
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- Drivers: hv: vmbus: Define an API to retrieve virtual processor index (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the event page (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the message page (bsc#1122822).++ kernel-source.spec (revision 4)Release: <RELEASE>.gbd4498d
- Drivers: hv: vmbus: Define APIs to manipulate the synthetic interrupt controller (bsc#1122822).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1111331).
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).
- locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file (bsc#1111331).
- MDS: Add CVE refs
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1129279).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1129279).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1129279).
- net: ena: complete host info to match latest ENA spec (bsc#1129279).
- net: ena: enable Low Latency Queues (bsc#1129279).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1129279).
- net: ena: fix auto casting to boolean (bsc#1129279).
- net: ena: fix compilation error in xtensa architecture (bsc#1129279).
- net: ena: fix crash during ena_remove() (bsc#1129279).
- net: ena: fix crash during failed resume from hibernation (bsc#1129279).
- net: ena: fix indentations in ena_defs for better readability (bsc#1129279).
- net: ena: Fix Kconfig dependency on X86 (bsc#1129279).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1129279).
- net: ena: fix race between link up and device initalization (bsc#1129279).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1129279).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1129279).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1129279).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1129279).
- net: ena: minor performance improvement (bsc#1129279).
- net: ena: remove ndo_poll_controller (bsc#1129279).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1129279).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1129279).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129279).
- net: ena: update driver version to 2.0.1 (bsc#1129279).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1129279).
- PCI: hv: Add vPCI version protocol negotiation (bnc#1043485, bsc#1122822).
- PCI: hv: Allocate interrupt descriptors with GFP_ATOMIC (bnc#1034113, bsc#1122822).
- PCI: hv: Disable/enable IRQs rather than BH in hv_compose_msi_msg() (bnc#1094268, bsc#1122822).
- PCI: hv: Do not sleep in compose_msi_msg() (bsc#1082632, bsc#1122822).
- PCI: hv: Fix 2 hang issues in hv_compose_msi_msg() (bsc#1087659, bsc#1087906, bsc#1122822).
- PCI: hv: Fix a comment typo in _hv_pcifront_read_config() (bsc#1087659, bsc#1122822).
- PCI: hv: Fix comment formatting and use proper integer fields (bnc#1043485, bsc#1122822).
- PCI: hv: Only queue new work items in hv_pci_devices_present() if necessary (bsc#1087659, bsc#1122822).
- PCI: hv: Remove the bogus test in hv_eject_device_work() (bsc#1087659, bsc#1122822).
- PCI: hv: Serialize the present and eject work items (bsc#1087659, bsc#1122822).
- PCI: hv: Specify CPU_AFFINITY_ALL for MSI affinity when >= 32 CPUs (bnc#1043485, bsc#1122822).
- PCI: hv: Temporary own CPU-number-to-vCPU-number infra (bnc#1043485, bsc#1122822).
- PCI: hv: Use effective affinity mask (bsc#1109772, bsc#1122822).
- PCI: hv: Use page allocation for hbus structure (bnc#1043485, bsc#1122822).
- PCI: hv: Use vPCI protocol version 1.2 (bnc#1043485, bsc#1122822).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1068032).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).
- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).
- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- s390: add explicit <linux/stringify.h> for jump label (bsc#1111331).
- sched/core: Optimize SCHED_SMT (bsc#1111331).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331).
- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().
- time: Introduce jiffies64_to_nsecs() (bsc#1113399).
- Use upstream variant of two pci-hyperv patches
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382 bsc#1100152).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1111331).
- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#1111331).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772, bsc#1122822).
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86: stop exporting msr-index.h to userland (bsc#1111331).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382 bsc#1100152).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382 bsc#1100152).
Patchnames
SUSE-2019-1287,SUSE-OpenStack-Cloud-7-2019-1287,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1287,SUSE-SLE-HA-12-SP2-2019-1287,SUSE-SLE-SAP-12-SP2-2019-1287,SUSE-SLE-SERVER-12-SP2-2019-1287,SUSE-SLE-SERVER-12-SP2-BCL-2019-1287,SUSE-Storage-4-2019-1287
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nFour new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)\n\n- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)\n- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)\n- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)\n- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)\n\nThis kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.\n\nFor more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736\n\nThe following security bugs were fixed:\n\n- CVE-2018-1128: It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network could use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. (bnc#1096748).\n- CVE-2018-1129: A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. (bnc#1096748).\n- CVE-2016-8636: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c allowed local users to cause a denial of service (memory corruption), obtain sensitive information or possibly have unspecified other impact via a write or read request involving the \u0027RDMA protocol over infiniband\u0027 (aka Soft RoCE) technology (bnc#1024908).\n- CVE-2017-18174: In the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).\n- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).\n- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c has multiple race conditions (bnc#1133188).\n- CVE-2019-3882: A flaw was found in the vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS) (bsc#1131427).\n- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).\n- CVE-2017-17741: The KVM implementation allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).\n- CVE-2019-9503, CVE-2019-8564: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828, bnc#1132673).\n\nThe following non-security bugs were fixed:\n\n- ACPI: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).\n- add mainline tags to four hyperv patches\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- Drivers: hv: vmbus: Define an API to retrieve virtual processor index (bsc#1122822).\n- Drivers: hv: vmbus: Define APIs to manipulate the event page (bsc#1122822).\n- Drivers: hv: vmbus: Define APIs to manipulate the message page (bsc#1122822).++ kernel-source.spec (revision 4)Release: \u0026lt;RELEASE\u003e.gbd4498d\n- Drivers: hv: vmbus: Define APIs to manipulate the synthetic interrupt controller (bsc#1122822).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1111331).\n- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).\n- locking/atomics, asm-generic: Move some macros from \u003clinux/bitops.h\u003e to a new \u003clinux/bits.h\u003e file (bsc#1111331).\n- MDS: Add CVE refs\n- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1129279).\n- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1129279).\n- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1129279).\n- net: ena: complete host info to match latest ENA spec (bsc#1129279).\n- net: ena: enable Low Latency Queues (bsc#1129279).\n- net: ena: explicit casting and initialization, and clearer error handling (bsc#1129279).\n- net: ena: fix auto casting to boolean (bsc#1129279).\n- net: ena: fix compilation error in xtensa architecture (bsc#1129279).\n- net: ena: fix crash during ena_remove() (bsc#1129279).\n- net: ena: fix crash during failed resume from hibernation (bsc#1129279).\n- net: ena: fix indentations in ena_defs for better readability (bsc#1129279).\n- net: ena: Fix Kconfig dependency on X86 (bsc#1129279).\n- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1129279).\n- net: ena: fix race between link up and device initalization (bsc#1129279).\n- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1129279).\n- net: ena: fix warning in rmmod caused by double iounmap (bsc#1129279).\n- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1129279).\n- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1129279).\n- net: ena: minor performance improvement (bsc#1129279).\n- net: ena: remove ndo_poll_controller (bsc#1129279).\n- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1129279).\n- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1129279).\n- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129279).\n- net: ena: update driver version to 2.0.1 (bsc#1129279).\n- net: ena: use CSUM_CHECKED device indication to report skb\u0027s checksum status (bsc#1129279).\n- PCI: hv: Add vPCI version protocol negotiation (bnc#1043485, bsc#1122822).\n- PCI: hv: Allocate interrupt descriptors with GFP_ATOMIC (bnc#1034113, bsc#1122822).\n- PCI: hv: Disable/enable IRQs rather than BH in hv_compose_msi_msg() (bnc#1094268, bsc#1122822).\n- PCI: hv: Do not sleep in compose_msi_msg() (bsc#1082632, bsc#1122822).\n- PCI: hv: Fix 2 hang issues in hv_compose_msi_msg() (bsc#1087659, bsc#1087906, bsc#1122822).\n- PCI: hv: Fix a comment typo in _hv_pcifront_read_config() (bsc#1087659, bsc#1122822).\n- PCI: hv: Fix comment formatting and use proper integer fields (bnc#1043485, bsc#1122822).\n- PCI: hv: Only queue new work items in hv_pci_devices_present() if necessary (bsc#1087659, bsc#1122822).\n- PCI: hv: Remove the bogus test in hv_eject_device_work() (bsc#1087659, bsc#1122822).\n- PCI: hv: Serialize the present and eject work items (bsc#1087659, bsc#1122822).\n- PCI: hv: Specify CPU_AFFINITY_ALL for MSI affinity when \u003e= 32 CPUs (bnc#1043485, bsc#1122822).\n- PCI: hv: Temporary own CPU-number-to-vCPU-number infra (bnc#1043485, bsc#1122822).\n- PCI: hv: Use effective affinity mask (bsc#1109772, bsc#1122822).\n- PCI: hv: Use page allocation for hbus structure (bnc#1043485, bsc#1122822).\n- PCI: hv: Use vPCI protocol version 1.2 (bnc#1043485, bsc#1122822).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- powerpc/64: Disable the speculation barrier from the command line (bsc#1068032).\n- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).\n- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).\n- powerpc/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).\n- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).\n- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).\n- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).\n- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).\n- s390: add explicit \u003clinux/stringify.h\u003e for jump label (bsc#1111331).\n- sched/core: Optimize SCHED_SMT (bsc#1111331).\n- sched/smt: Expose sched_smt_present static key (bsc#1106913).\n- sched/smt: Make sched_smt_present track topology (bsc#1106913).\n- sched/smt: Update sched_smt_present at runtime (bsc#1111331).\n- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().\n- time: Introduce jiffies64_to_nsecs() (bsc#1113399).\n- Use upstream variant of two pci-hyperv patches\n- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382 bsc#1100152).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1111331).\n- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331).\n- x86/cpu: Rename Merrifield2 to Moorefield (bsc#1111331).\n- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772, bsc#1122822).\n- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).\n- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).\n- x86/msr-index: Cleanup bit defines (bsc#1111331).\n- x86/speculation: Consolidate CPU whitelists (bsc#1111331).\n- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).\n- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).\n- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).\n- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).\n- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).\n- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).\n- x86/speculation/mds: Add \u0027mitigations=\u0027 support for MDS (bsc#1111331).\n- x86/speculation/mds: Add SMT warning message (bsc#1111331).\n- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).\n- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).\n- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).\n- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).\n- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).\n- x86/speculation: Rework SMT state change (bsc#1111331).\n- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).\n- x86/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- x86: stop exporting msr-index.h to userland (bsc#1111331).\n- xfrm6: call kfree_skb when skb is toobig (bnc#1012382 bsc#1100152).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382 bsc#1100152).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1287,SUSE-OpenStack-Cloud-7-2019-1287,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1287,SUSE-SLE-HA-12-SP2-2019-1287,SUSE-SLE-SAP-12-SP2-2019-1287,SUSE-SLE-SERVER-12-SP2-2019-1287,SUSE-SLE-SERVER-12-SP2-BCL-2019-1287,SUSE-Storage-4-2019-1287", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1287-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1287-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191287-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1287-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1024908", "url": "https://bugzilla.suse.com/1024908" }, { "category": "self", "summary": "SUSE Bug 1034113", "url": "https://bugzilla.suse.com/1034113" }, { "category": "self", "summary": "SUSE Bug 1043485", "url": "https://bugzilla.suse.com/1043485" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1080157", "url": "https://bugzilla.suse.com/1080157" }, { "category": "self", "summary": "SUSE Bug 1080533", "url": "https://bugzilla.suse.com/1080533" }, { "category": "self", "summary": "SUSE Bug 1082632", "url": "https://bugzilla.suse.com/1082632" }, { "category": "self", "summary": "SUSE Bug 1087231", "url": "https://bugzilla.suse.com/1087231" }, { "category": "self", "summary": "SUSE Bug 1087659", "url": "https://bugzilla.suse.com/1087659" }, { "category": "self", "summary": "SUSE Bug 1087906", "url": "https://bugzilla.suse.com/1087906" }, { "category": "self", "summary": "SUSE Bug 1093158", "url": "https://bugzilla.suse.com/1093158" }, { "category": "self", "summary": "SUSE Bug 1094268", "url": "https://bugzilla.suse.com/1094268" }, { "category": "self", "summary": "SUSE Bug 1096748", "url": "https://bugzilla.suse.com/1096748" }, { "category": "self", "summary": "SUSE Bug 1100152", "url": "https://bugzilla.suse.com/1100152" }, { "category": "self", "summary": "SUSE Bug 1103186", "url": "https://bugzilla.suse.com/1103186" }, { "category": "self", "summary": "SUSE Bug 1106913", "url": "https://bugzilla.suse.com/1106913" }, { "category": "self", "summary": "SUSE Bug 1109772", "url": "https://bugzilla.suse.com/1109772" }, { "category": "self", "summary": "SUSE Bug 1111331", "url": "https://bugzilla.suse.com/1111331" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113399", "url": "https://bugzilla.suse.com/1113399" }, { "category": "self", "summary": "SUSE Bug 1116841", "url": "https://bugzilla.suse.com/1116841" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1124832", "url": "https://bugzilla.suse.com/1124832" }, { "category": "self", "summary": "SUSE Bug 1125580", "url": "https://bugzilla.suse.com/1125580" }, { "category": "self", "summary": "SUSE Bug 1129279", "url": "https://bugzilla.suse.com/1129279" }, { "category": "self", "summary": "SUSE Bug 1131416", "url": "https://bugzilla.suse.com/1131416" }, { "category": "self", "summary": "SUSE Bug 1131427", "url": "https://bugzilla.suse.com/1131427" }, { "category": "self", "summary": "SUSE Bug 1131587", "url": "https://bugzilla.suse.com/1131587" }, { "category": "self", "summary": "SUSE Bug 1132673", "url": "https://bugzilla.suse.com/1132673" }, { "category": "self", "summary": "SUSE Bug 1132828", "url": "https://bugzilla.suse.com/1132828" }, { "category": "self", "summary": "SUSE Bug 1133188", "url": "https://bugzilla.suse.com/1133188" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8636 page", "url": "https://www.suse.com/security/cve/CVE-2016-8636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18174 page", "url": "https://www.suse.com/security/cve/CVE-2017-18174/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1091 page", "url": "https://www.suse.com/security/cve/CVE-2018-1091/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1120 page", "url": "https://www.suse.com/security/cve/CVE-2018-1120/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1128 page", "url": "https://www.suse.com/security/cve/CVE-2018-1128/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1129 page", "url": "https://www.suse.com/security/cve/CVE-2018-1129/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12127 page", "url": "https://www.suse.com/security/cve/CVE-2018-12127/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12130 page", "url": "https://www.suse.com/security/cve/CVE-2018-12130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19407 page", "url": "https://www.suse.com/security/cve/CVE-2018-19407/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11091 page", "url": "https://www.suse.com/security/cve/CVE-2019-11091/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11486 page", "url": "https://www.suse.com/security/cve/CVE-2019-11486/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9503 page", "url": "https://www.suse.com/security/cve/CVE-2019-9503/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-05-17T13:47:13Z", "generator": { "date": "2019-05-17T13:47:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1287-1", "initial_release_date": "2019-05-17T13:47:13Z", "revision_history": [ { "date": "2019-05-17T13:47:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.109.2.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.109.2.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.109.2.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.109.2.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.109.2.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.109.2.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.109.2.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.109.2.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.109.2.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.109.2.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.109.2.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.109.2.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.109.2.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.109.2.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.109.2.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.109.2.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-default-4.4.121-92.109.2.aarch64", "product_id": "kernel-default-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.109.2.aarch64", "product_id": "kernel-default-base-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.109.2.aarch64", "product_id": "kernel-default-devel-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.109.2.aarch64", "product_id": "kernel-default-extra-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.109.2.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.109.2.aarch64", "product_id": "kernel-obs-build-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.109.2.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-syms-4.4.121-92.109.2.aarch64", "product_id": "kernel-syms-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.109.2.aarch64", "product_id": "kernel-vanilla-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.109.2.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.109.2.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.109.2.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.109.2.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.109.2.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.109.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.109.2.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.109.2.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.109.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.109.2.noarch", "product": { "name": "kernel-devel-4.4.121-92.109.2.noarch", "product_id": "kernel-devel-4.4.121-92.109.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.109.3.noarch", "product": { "name": "kernel-docs-4.4.121-92.109.3.noarch", "product_id": "kernel-docs-4.4.121-92.109.3.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.109.3.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.109.3.noarch", "product_id": "kernel-docs-html-4.4.121-92.109.3.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.109.3.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.109.3.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.109.3.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.109.2.noarch", "product": { "name": "kernel-macros-4.4.121-92.109.2.noarch", "product_id": "kernel-macros-4.4.121-92.109.2.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.109.2.noarch", "product": { "name": "kernel-source-4.4.121-92.109.2.noarch", "product_id": "kernel-source-4.4.121-92.109.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.109.2.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.109.2.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.109.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.109.2.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.109.2.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.109.2.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.109.2.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.109.2.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.109.2.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.109.2.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.109.2.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.109.2.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.109.2.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.109.2.ppc64le", "product_id": "kernel-debug-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.109.2.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.109.2.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.109.2.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.109.2.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-default-4.4.121-92.109.2.ppc64le", "product_id": "kernel-default-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.109.2.ppc64le", "product_id": "kernel-default-base-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.109.2.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.109.2.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.109.2.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.109.2.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.109.2.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.109.2.ppc64le", "product_id": "kernel-syms-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.109.2.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.109.2.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.109.2.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.109.2.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "product_id": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.109.2.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.109.2.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.109.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.109.2.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.109.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.109.2.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.109.2.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.109.2.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.109.2.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.109.2.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.109.2.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.109.2.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.109.2.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.109.2.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.109.2.s390x", "product_id": "dlm-kmp-default-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.109.2.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.109.2.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.109.2.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.109.2.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.109.2.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.109.2.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.109.2.s390x", "product": { "name": "kernel-default-4.4.121-92.109.2.s390x", "product_id": "kernel-default-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.109.2.s390x", "product": { "name": "kernel-default-base-4.4.121-92.109.2.s390x", "product_id": "kernel-default-base-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.109.2.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.109.2.s390x", "product_id": "kernel-default-devel-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.109.2.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.109.2.s390x", "product_id": "kernel-default-extra-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.109.2.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.109.2.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.109.2.s390x", "product": { "name": "kernel-default-man-4.4.121-92.109.2.s390x", "product_id": "kernel-default-man-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.109.2.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.109.2.s390x", "product_id": "kernel-obs-build-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.109.2.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.109.2.s390x", "product_id": "kernel-obs-qa-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.109.2.s390x", "product": { "name": "kernel-syms-4.4.121-92.109.2.s390x", "product_id": "kernel-syms-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.109.2.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.109.2.s390x", "product_id": "kernel-vanilla-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.109.2.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.109.2.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.109.2.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.109.2.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.109.2.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.109.2.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.109.2.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.109.2.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.109.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.109.2.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.109.2.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.109.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.109.2.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.109.2.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.109.2.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.109.2.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.109.2.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.109.2.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.109.2.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.109.2.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.109.2.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.109.2.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.109.2.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.109.2.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.109.2.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.109.2.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.109.2.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.109.2.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.109.2.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.109.2.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.109.2.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.109.2.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-debug-4.4.121-92.109.2.x86_64", "product_id": "kernel-debug-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.109.2.x86_64", "product_id": "kernel-debug-base-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.109.2.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.109.2.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.109.2.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-default-4.4.121-92.109.2.x86_64", "product_id": "kernel-default-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.109.2.x86_64", "product_id": "kernel-default-base-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.109.2.x86_64", "product_id": "kernel-default-devel-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.109.2.x86_64", "product_id": "kernel-default-extra-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.109.2.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.109.2.x86_64", "product_id": "kernel-obs-build-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.109.2.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-syms-4.4.121-92.109.2.x86_64", "product_id": "kernel-syms-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.109.2.x86_64", "product_id": "kernel-vanilla-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.109.2.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.109.2.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.109.2.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "product_id": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.109.2.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.109.2.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.109.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.109.2.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.109.2.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.109.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-default-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.109.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.109.2.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-devel-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.109.2.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-macros-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.109.2.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-source-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-syms-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-devel-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-macros-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-source-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-default-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-devel-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-macros-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-source-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.109.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x" }, "product_reference": "kernel-syms-4.4.121-92.109.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-devel-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-macros-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.109.2.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-source-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.109.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.109.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.109.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.109.2.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-devel-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.109.2.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-macros-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.109.2.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch" }, "product_reference": "kernel-source-4.4.121-92.109.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.109.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.109.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8636" } ], "notes": [ { "category": "general", "text": "Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the \"RDMA protocol over infiniband\" (aka Soft RoCE) technology.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8636", "url": "https://www.suse.com/security/cve/CVE-2016-8636" }, { "category": "external", "summary": "SUSE Bug 1024908 for CVE-2016-8636", "url": "https://bugzilla.suse.com/1024908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "important" } ], "title": "CVE-2016-8636" }, { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-18174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18174" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18174", "url": "https://www.suse.com/security/cve/CVE-2017-18174" }, { "category": "external", "summary": "SUSE Bug 1080533 for CVE-2017-18174", "url": "https://bugzilla.suse.com/1080533" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2017-18174" }, { "cve": "CVE-2018-1091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1091" } ], "notes": [ { "category": "general", "text": "In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1091", "url": "https://www.suse.com/security/cve/CVE-2018-1091" }, { "category": "external", "summary": "SUSE Bug 1087231 for CVE-2018-1091", "url": "https://bugzilla.suse.com/1087231" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2018-1091" }, { "cve": "CVE-2018-1120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1120" } ], "notes": [ { "category": "general", "text": "A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1120", "url": "https://www.suse.com/security/cve/CVE-2018-1120" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092100 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1092100" }, { "category": "external", "summary": "SUSE Bug 1093158 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1093158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "low" } ], "title": "CVE-2018-1120" }, { "cve": "CVE-2018-1128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1128" } ], "notes": [ { "category": "general", "text": "It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1128", "url": "https://www.suse.com/security/cve/CVE-2018-1128" }, { "category": "external", "summary": "SUSE Bug 1096748 for CVE-2018-1128", "url": "https://bugzilla.suse.com/1096748" }, { "category": "external", "summary": "SUSE Bug 1114710 for CVE-2018-1128", "url": "https://bugzilla.suse.com/1114710" }, { "category": "external", "summary": "SUSE Bug 1177843 for CVE-2018-1128", "url": "https://bugzilla.suse.com/1177843" }, { "category": "external", "summary": "SUSE Bug 1177859 for CVE-2018-1128", "url": "https://bugzilla.suse.com/1177859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "important" } ], "title": "CVE-2018-1128" }, { "cve": "CVE-2018-1129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1129" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1129", "url": "https://www.suse.com/security/cve/CVE-2018-1129" }, { "category": "external", "summary": "SUSE Bug 1096748 for CVE-2018-1129", "url": "https://bugzilla.suse.com/1096748" }, { "category": "external", "summary": "SUSE Bug 1114710 for CVE-2018-1129", "url": "https://bugzilla.suse.com/1114710" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "important" } ], "title": "CVE-2018-1129" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12127" } ], "notes": [ { "category": "general", "text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12127", "url": "https://www.suse.com/security/cve/CVE-2018-12127" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2018-12127" }, { "cve": "CVE-2018-12130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12130" } ], "notes": [ { "category": "general", "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12130", "url": "https://www.suse.com/security/cve/CVE-2018-12130" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2018-12130" }, { "cve": "CVE-2018-19407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19407" } ], "notes": [ { "category": "general", "text": "The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19407", "url": "https://www.suse.com/security/cve/CVE-2018-19407" }, { "category": "external", "summary": "SUSE Bug 1116841 for CVE-2018-19407", "url": "https://bugzilla.suse.com/1116841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2018-19407" }, { "cve": "CVE-2019-11091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11091" } ], "notes": [ { "category": "general", "text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11091", "url": "https://www.suse.com/security/cve/CVE-2019-11091" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1135394 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1135394" }, { "category": "external", "summary": "SUSE Bug 1138043 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138043" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2019-11091" }, { "cve": "CVE-2019-11486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11486" } ], "notes": [ { "category": "general", "text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11486", "url": "https://www.suse.com/security/cve/CVE-2019-11486" }, { "category": "external", "summary": "SUSE Bug 1133188 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1133188" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1156434" }, { "category": "external", "summary": "SUSE Bug 1173667 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1173667" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2019-11486" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-9503", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9503" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9503", "url": "https://www.suse.com/security/cve/CVE-2019-9503" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1132828" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1156653 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1156653" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.109.2.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.109.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.109.2.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.109.2.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_109-default-1-3.5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-17T13:47:13Z", "details": "moderate" } ], "title": "CVE-2019-9503" } ] }
suse-su-2018:1816-1
Vulnerability from csaf_suse
Published
2018-06-26 11:39
Modified
2018-06-26 11:39
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.138 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by
calling setxattr twice with two different extended attribute names on the same
file. This vulnerability could be triggered by an unprivileged user with the
ability to create files and execute programs (bsc#1097234)
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
registers) between processes. These registers might contain encryption keys
when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
not handle unsigned integer overflow properly. As a result, a large value of
the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
nid, which allowed local users to cause a denial of service (race condition) or
possibly have unspecified other impact via concurrent threads (bnc#1087036)
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
option that triggers a NULL value for a flush_cmd_control data structure
(bnc#1086400)
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers
to obtain potentially sensitive information from kernel memory, aka a
write_mmio stack-based out-of-bounds read (bnc#1073311)
- CVE-2018-3639: Systems with microprocessors utilizing speculative execution
and speculative execution of memory reads the addresses of all prior memory
writes are known may have allowed unauthorized disclosure of information to an
attacker with local user access via a side-channel analysis, aka Speculative
Store Bypass (SSB), Variant 4 (bsc#1087082).
- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability
allowing local users with access to the udldrmfb driver to obtain full read and
write permissions on kernel physical pages, resulting in a code execution in
kernel space (bsc#1090643).
- CVE-2017-13305: Prevent information disclosure vulnerability in
encrypted-keys (bsc#1094353)
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
cause a denial of service (out-of-bounds read and system crash) via a crafted
ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers
(bsc#1087095)
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
crc32c checksum driver, which allowed attackers to cause a denial of service
(ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
ext4 image (bsc#1087007)
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
with a zero i_links_count, which allowed attackers to cause a denial of service
(ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
image (bsc#1087012)
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
allowed a local user to cause a denial of service by a number of certain
crafted system calls (bsc#1092904)
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
handling SCTP packets length that could have been exploited to cause a kernel
crash (bnc#1083900)
- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob
that contains a jump but lacks a user-defined chain, which allowed local users
to cause a denial of service (NULL pointer dereference) by leveraging the
CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650)
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
__rds_rdma_map() function that allowed local attackers to cause a system panic
and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
(bsc#1082962)
- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that
could have caused a crash and possibly memory corruption (bsc#1089895)
The following non-security bugs were fixed:
- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).
- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).
- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).
- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).
- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).
- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).
- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).
- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).
- ALSA: aloop: Add missing cable lock to ctl API callbacks (bnc#1012382).
- ALSA: aloop: Mark paused device as inactive (bnc#1012382).
- ALSA: asihpi: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: control: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: control: fix a redundant-copy issue (bnc#1012382).
- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).
- ALSA: hda - New VIA controller suppor no-snoop path (bnc#1012382).
- ALSA: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).
- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).
- ALSA: hda/realtek - Add some fixes for ALC233 (bnc#1012382).
- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).
- ALSA: hda: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: hdspm: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: line6: Use correct endpoint type for midi output (bnc#1012382).
- ALSA: opl3: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).
- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).
- ALSA: pcm: Check PCM state at xfern compat ioctl (bnc#1012382).
- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).
- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).
- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).
- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).
- ALSA: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).
- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).
- ALSA: rme9652: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bnc#1012382).
- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).
- ALSA: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).
- ALSA: timer: Fix pause event notification (bnc#1012382 bsc#973378).
- ALSA: timer: Fix pause event notification (bsc#973378).
- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).
- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).
- ALSA: vmaster: Propagate slave error (bnc#1012382).
- ARC: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).
- ARM: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).
- ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).
- ARM: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).
- ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).
- ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).
- ARM: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).
- ARM: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).
- ARM: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).
- ARM: OMAP: Fix dmtimer init for omap1 (bnc#1012382).
- ARM: amba: Do not read past the end of sysfs 'driver_override' buffer (bnc#1012382).
- ARM: amba: Fix race condition with driver_override (bnc#1012382).
- ARM: amba: Make driver_override output consistent with other buses (bnc#1012382).
- ARM: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).
- ARM: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).
- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).
- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).
- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).
- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).
- ASoC: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).
- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).
- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).
- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).
- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).
- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).
- Btrfs: Fix possible softlock on single core machines (bnc#1012382).
- Btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).
- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).
- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).
- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).
- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).
- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).
- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).
- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).
- Btrfs: fix xattr loss after power failure (bnc#1012382).
- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).
- Btrfs: set plug for fsync (bnc#1012382).
- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).
- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).
- Correct the prefix in references tag in previous patches (bsc#1041740).
- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).
- ENABLE_IBRS clobbers %rax which it shouldn't do
- Enable uinput driver (bsc#1092566).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- Fixes typo for (watchdog: hpwdt: Update nmi_panic message) (bsc#1085185).
- Force log to disk before reading the AGF during a fstrim (bnc#1012382).
- HID: Fix hid_report_len usage (bnc#1012382).
- HID: core: Fix size as type u32 (bnc#1012382).
- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).
- HID: i2c-hid: fix size check and type usage (bnc#1012382).
- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).
- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).
- IB/mlx5: Use unlimited rate when static rate is not supported (bnc#1012382).
- IB/srp: Fix completion vector assignment algorithm (bnc#1012382).
- IB/srp: Fix srp_abort() (bnc#1012382).
- Input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).
- Input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).
- Input: ALPS - fix trackstick button handling on V8 devices (git-fixes).
- Input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).
- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bnc#1012382).
- Input: drv260x - fix initializing overdrive voltage (bnc#1012382).
- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).
- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).
- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).
- Input: leds - fix out of bound access (bnc#1012382).
- KEYS: DNS: limit the length of option strings (bnc#1012382).
- KVM: Fix spelling mistake: 'cop_unsuable' -> 'cop_unusable' (bnc#1012382).
- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).
- KVM: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).
- KVM: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).
- KVM: s390: Enable all facility bits that are known good for passthrough (bnc#1012382 bsc#1073059 bsc#1076805).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- KVM: x86: introduce linear_{read,write}_system (bnc#1012382).
- KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).
- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).
- MIPS: Fix ptrace(2) PTRACE_PEEKUSR and PTRACE_POKEUSR accesses to o32 FGRs (bnc#1012382).
- MIPS: Octeon: Fix logging messages with spurious periods after newlines (bnc#1012382).
- MIPS: TXx9: use IS_BUILTIN() for CONFIG_LEDS_CLASS (bnc#1012382).
- MIPS: ath79: Fix AR724X_PLL_REG_PCIE_CONFIG offset (bnc#1012382).
- MIPS: memset.S: EVA and fault support for small_memset (bnc#1012382).
- MIPS: memset.S: Fix clobber of v1 in last_fixup (bnc#1012382).
- MIPS: memset.S: Fix return of __clear_user from Lpartial_fixup (bnc#1012382).
- MIPS: prctl: Disallow FRE without FR with PR_SET_FP_MODE requests (bnc#1012382).
- MIPS: ptrace: Expose FIR register through FP regset (bnc#1012382).
- MIPS: ptrace: Fix PTRACE_PEEKUSR requests for 64-bit FGRs (bnc#1012382).
- MIPS: uaccess: Add micromips clobbers to bzero invocation (bnc#1012382).
- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bnc#1012382).
- NFC: llcp: Limit size of SDP URI (bnc#1012382).
- NFSv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).
- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).
- PCI: Restore config space on runtime resume despite being unbound (bnc#1012382).
- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094268).
- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).
- RDMA/mlx5: Protect from shift operand overflow (bnc#1012382).
- RDMA/qedr: Fix doorbell bar mapping for dpi > 1 (bsc#1022604).
- RDMA/ucma: Allow resolving address w/o specifying source address (bnc#1012382).
- RDMA/ucma: Correct option size check using optlen (bnc#1012382).
- RDMA/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).
- RDS: IB: Fix null pointer issue (bnc#1012382).
- Revert 'ARM: dts: imx6qdl-wandboard: Fix audio channel swap' (bnc#1012382).
- Revert 'Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174' (bnc#1012382).
- Revert 'KVM: Fix stack-out-of-bounds read in write_mmio' (bnc#1083635).
- Revert 'ath10k: rebuild crypto header in rx data frames' (kabi).
- Revert 'ath10k: send (re)assoc peer command when NSS changed' (bnc#1012382).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- Revert 'ima: limit file hash setting by user to fix and log modes' (bnc#1012382).
- Revert 'ipc/shm: Fix shmat mmap nil-page protection' (bnc#1012382).
- Revert 'perf tests: Decompress kernel module before objdump' (bnc#1012382).
- Revert 'vti4: Do not override MTU passed on link creation via IFLA_MTU' (bnc#1012382).
- Revert 'watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).' This reverts commit 3e75a004de79c213a2c919144da3d413922661db.
- Revert 'x86/fpu: Hard-disable lazy FPU mode' (compatibility).
- USB: Accept bulk endpoints with 1024-byte maxpacket (bnc#1012382 bsc#1092888).
- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).
- USB: Increment wakeup count on remote wakeup (bnc#1012382).
- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).
- USB: serial: cp210x: add ID for NI USB serial console (bnc#1012382).
- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).
- USB: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).
- USB: serial: option: Add support for Quectel EP06 (bnc#1012382).
- USB: serial: option: adding support for ublox R410M (bnc#1012382).
- USB: serial: option: reimplement interface masking (bnc#1012382).
- USB: serial: simple: add libtransistor console (bnc#1012382).
- USB: serial: visor: handle potential invalid device configuration (bnc#1012382).
- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).
- Update config files, add expoline for s390x (bsc#1089393).
- af_key: Always verify length of provided sadb_key (bnc#1012382).
- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).
- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).
- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).
- arm64: Add 'ssbd' command-line option (bsc#1085308).
- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).
- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).
- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).
- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).
- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).
- arm64: alternatives: Add dynamic patching feature (bsc#1085308).
- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).
- arm64: do not call C code with el0's fp register (bsc#1085308).
- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).
- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).
- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).
- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).
- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).
- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).
- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).
- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).
- asm-generic: provide generic_pmdp_establish() (bnc#1012382).
- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- ath10k: rebuild crypto header in rx data frames (bnc#1012382).
- ath9k_hw: check if the chip failed to wake up (bnc#1012382).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).
- audit: return on memory error to avoid null pointer dereference (bnc#1012382).
- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).
- autofs: change autofs4_wait() to take struct path (bsc#1086716).
- autofs: mount point create should honour passed in mode (bnc#1012382).
- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).
- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).
- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).
- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).
- batman-adv: fix packet checksum in receive path (bnc#1012382).
- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).
- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).
- bcache: fix for allocator and register thread race (bnc#1012382).
- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).
- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).
- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).
- bcache: return attach error when no cache set exist (bnc#1012382).
- bdi: Fix oops in wb_workfn() (bnc#1012382).
- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)
- block/loop: fix deadlock after loop_set_status (bnc#1012382).
- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).
- block: sanity check for integrity intervals (bsc#1091728).
- bnx2x: use the right constant (bnc#1012382).
- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).
- bonding: do not allow rlb updates to invalid mac (bnc#1012382).
- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).
- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).
- bpf: map_get_next_key to return first key on NULL (bnc#1012382).
- brcmfmac: Fix check for ISO3166 code (bnc#1012382).
- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).
- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bnc#1012382).
- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).
- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).
- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).
- ceph: adding protection for showing cap reservation info (bsc#1089115).
- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).
- ceph: check if mds create snaprealm when setting quota (bsc#1089115).
- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).
- ceph: do not check quota for snap inode (bsc#1089115).
- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).
- ceph: fix race of queuing delayed caps (bsc#1096214).
- ceph: fix root quota realm check (bsc#1089115).
- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).
- ceph: fix st_nlink stat for directories (bsc#1093904).
- ceph: quota: add counter for snaprealms with quota (bsc#1089115).
- ceph: quota: add initial infrastructure to support cephfs quotas (bsc#1089115).
- ceph: quota: cache inode pointer in ceph_snap_realm (bsc#1089115).
- ceph: quota: do not allow cross-quota renames (bsc#1089115).
- ceph: quota: report root dir quota usage in statfs (bsc#1089115).
- ceph: quota: support for ceph.quota.max_bytes (bsc#1089115).
- ceph: quota: support for ceph.quota.max_files (bsc#1089115).
- ceph: quota: update MDS when max_bytes is approaching (bsc#1089115).
- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).
- cfg80211: further limit wiphy names to 64 bytes (git-fixes).
- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).
- cifs: Use file_dentry() (bsc#1093008).
- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).
- clk: Do not show the incorrect clock phase (bnc#1012382).
- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).
- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).
- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).
- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).
- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).
- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).
- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).
- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).
- config: arm64: enable Spectre-v4 per-thread mitigation
- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).
- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).
- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).
- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).
- crypto: af_alg - fix possible uninit-value in alg_bind() (bnc#1012382).
- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).
- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).
- cxgb4: Setup FW queues before registering netdev (bsc#1022743).
- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).
- dccp: fix tasklet usage (bnc#1012382).
- dccp: initialize ireq->ir_mark (bnc#1012382).
- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).
- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).
- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).
- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).
- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).
- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).
- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).
- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).
- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).
- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).
- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).
- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).
- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).
- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).
- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).
- drm/virtio: fix vq wait_event condition (bnc#1012382).
- drm/vmwgfx: Fix a buffer object leak (bnc#1012382).
- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).
- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).
- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).
- efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode (bnc#1012382).
- enic: enable rq before updating rq descriptors (bnc#1012382).
- enic: set DMA mask to 47 bit (bnc#1012382).
- ext2: fix a block leak (bnc#1012382).
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ext4: add validity checks for bitmap block numbers (bnc#1012382).
- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).
- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).
- ext4: fix bitmap position validation (bnc#1012382).
- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).
- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).
- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).
- fanotify: fix logic of events on child (bnc#1012382).
- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).
- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).
- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).
- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).
- fix io_destroy()/aio_complete() race (bnc#1012382).
- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).
- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).
- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).
- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).
- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).
- futex: futex_wake_op, do not fail on invalid op (git-fixes).
- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).
- getname_kernel() needs to make sure that ->name != ->iname in long case (bnc#1012382).
- gfs2: Fix fallocate chunk size (bnc#1012382).
- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).
- gpio: No NULL owner (bnc#1012382).
- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).
- gpmi-nand: Handle ECC Errors in erased pages (bnc#1012382).
- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).
- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).
- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).
- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).
- hwrng: stm32 - add reset during probe (bnc#1012382).
- hwtracing: stm: fix build error on some arches (bnc#1012382).
- hypfs_kill_super(): deal with failed allocations (bnc#1012382).
- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).
- i2c: rcar: check master irqs before slave irqs (bnc#1012382).
- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).
- i2c: rcar: init new messages in irq (bnc#1012382).
- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).
- i2c: rcar: refactor setup of a msg (bnc#1012382).
- i2c: rcar: remove spinlock (bnc#1012382).
- i2c: rcar: remove unused IOERROR state (bnc#1012382).
- i2c: rcar: revoke START request early (bnc#1012382).
- i2c: rcar: rework hw init (bnc#1012382).
- ibmvnic: Check CRQ command return codes (bsc#1094840).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- ibmvnic: Create separate initialization routine for resets (bsc#1094840).
- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).
- ibmvnic: Fix partial success login retries (bsc#1094840).
- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).
- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).
- ibmvnic: Handle error case when setting link state (bsc#1094840).
- ibmvnic: Introduce active CRQ state (bsc#1094840).
- ibmvnic: Introduce hard reset recovery (bsc#1094840).
- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).
- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).
- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).
- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).
- iio:kfifo_buf: check for uint overflow (bnc#1012382).
- ima: Fallback to the builtin hash algorithm (bnc#1012382).
- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).
- init: fix false positives in W+X checking (bsc#1096982).
- iommu/vt-d: Fix a potential memory leak (bnc#1012382).
- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).
- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).
- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).
- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).
- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799).
- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).
- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).
- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).
- ipv4: remove warning in ip_recv_error (bnc#1012382).
- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- ipvs: fix rtnl_lock lockups caused by start_sync_thread (bnc#1012382).
- irda: fix overly long udelay() (bnc#1012382).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).
- isdn: eicon: fix a missing-check bug (bnc#1012382).
- jbd2: fix use after free in kjournald2() (bnc#1012382).
- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (bnc#1012382 git-fixes).
- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).
- kABI: work around BPF SSBD removal (bsc#1087082).
- kabi: vfs: Restore dentry_operations->d_manage (bsc#1086716).
- kasan: fix memory hotplug during boot (bnc#1012382).
- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).
- kconfig: Do not leak main menus during parsing (bnc#1012382).
- kconfig: Fix automatic menu creation mem leak (bnc#1012382).
- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).
- kdb: make 'mdr' command repeat (bnc#1012382).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).
- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, ).
- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- kobject: do not use WARN for registration failures (bnc#1012382).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).
- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).
- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).
- l2tp: revert 'l2tp: fix missing print session offset info' (bnc#1012382).
- lan78xx: Correctly indicate invalid OTP (bnc#1012382).
- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bnc#1012382).
- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).
- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).
- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).
- libceph: fix misjudgement of maximum monitor number (bsc#1089115).
- libceph: reschedule a tick in finish_hunting() (bsc#1089115).
- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).
- libceph: validate con->state at the top of try_write() (bsc#1089115).
- libnvdimm, dax: fix 1GB-aligned namespaces vs physical misalignment
- libnvdimm, namespace: use a safe lookup for dimm device name
- libnvdimm, pfn: fix start_pad handling for aligned namespaces
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299).
- llc: better deal with too small mtu (bnc#1012382).
- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).
- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).
- llc: hold llc_sap before release_sock() (bnc#1012382).
- llc: properly handle dev_queue_xmit() return value (bnc#1012382).
- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).
- locking/qspinlock: Ensure node->count is updated before initialising node (bnc#1012382).
- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).
- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).
- loop: handle short DIO reads (bsc#1094177).
- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).
- mac80211: Add RX flag to indicate ICV stripped (bnc#1012382).
- mac80211: allow not sending MIC up from driver for HW crypto (bnc#1012382).
- mac80211: allow same PN for AMSDU sub-frames (bnc#1012382).
- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).
- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).
- md/raid1: fix NULL pointer dereference (bnc#1012382).
- md: document lifetime of internal rdev pointer (bsc#1056415).
- md: fix two problems with setting the 're-add' device state (bsc#1089023).
- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).
- md: raid5: avoid string overflow warning (bnc#1012382).
- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).
- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).
- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).
- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).
- media: em28xx: USB bulk packet size fix (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).
- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).
- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).
- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).
- mm/ksm: fix interaction with THP (bnc#1012382).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).
- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).
- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).
- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).
- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (-- VM bnc#1012382 bnc#971975 generic performance read).
- mm: filemap: remove redundant code in do_read_cache_page (-- VM bnc#1012382 bnc#971975 generic performance read).
- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).
- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).
- mmap: introduce sane default mmap limits (bnc#1012382).
- mmap: relax file size limit for regular files (bnc#1012382).
- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).
- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).
- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).
- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).
- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).
- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).
- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).
- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).
- net/mlx5: Protect from command bit overflow (bnc#1012382).
- net/packet: refine check for priv area size (bnc#1012382).
- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).
- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).
- net: Fix untag for vlan packets without ethernet header (bnc#1012382).
- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).
- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).
- net: atm: Fix potential Spectre v1 (bnc#1012382).
- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).
- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).
- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).
- net: fix rtnh_ok() (bnc#1012382).
- net: fix uninit-value in __hw_addr_add_ex() (bnc#1012382).
- net: initialize skb->peeked when cloning (bnc#1012382).
- net: metrics: add proper netlink validation (bnc#1012382).
- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).
- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).
- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).
- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).
- net: test tailroom before appending to linear skb (bnc#1012382).
- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).
- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).
- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).
- netdev-FAQ: clarify DaveM's position for stable backports (bnc#1012382).
- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).
- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).
- netlink: fix uninit-value in netlink_sendmsg (bnc#1012382).
- nfit, address-range-scrub: fix scrub in-progress reporting
- nfit: fix region registration vs block-data-window ranges
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).
- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).
- nvme-pci: Fix EEH failure on ppc (bsc#1093533).
- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).
- nvme: target: fix buffer overflow (bsc#993388).
- ocfs2/acl: use 'ip_xattr_sem' to protect getting extended attribute (bnc#1012382).
- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).
- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).
- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1070404).
- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).
- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).
- packet: fix bitfield update race (bnc#1012382).
- packet: fix reserve calculation (bnc#1012382 git-fixes).
- packet: fix reserve calculation (git-fixes).
- packet: in packet_snd start writing at link layer allocation (bnc#1012382).
- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).
- parisc: Fix out of array access in match_pci_device() (bnc#1012382).
- percpu: include linux/sched.h for cond_resched() (bnc#1012382).
- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).
- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).
- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).
- perf intel-pt: Fix sync_switch (bnc#1012382).
- perf intel-pt: Fix timestamp following overflow (bnc#1012382).
- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).
- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).
- perf/cgroup: Fix child event counting bug (bnc#1012382).
- perf/core: Fix perf_output_read_group() (bnc#1012382).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages[] (bnc#1012382).
- perf/core: Fix the perf_cpu_time_max_percent check (bnc#1012382).
- perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr (bnc#1012382).
- perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver (bnc#1012382).
- perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (bnc#1012382).
- perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (bnc#1012382).
- perf: Remove superfluous allocation error check (bnc#1012382).
- perf: Return proper values for user stack errors (bnc#1012382).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).
- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Clear PCR on boot (bnc#1012382).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).
- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).
- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).
- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).
- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).
- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).
- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).
- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).
- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).
- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).
- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).
- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).
- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).
- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).
- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).
- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).
- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).
- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- powerpc: conditionally compile platform-specific serial drivers (bsc#1066223).
- powerpc: signals: Discard transaction state from signal frames (bsc#1094059).
- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).
- proc read mm's {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).
- proc: fix /proc/*/map_files lookup (bnc#1012382).
- proc: meminfo: estimate available memory more conservatively (-- VM bnc#1012382 functionality monitoring space user).
- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).
- qed: Fix LL2 race during connection terminate (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix mask for physical address in ILT entry (bnc#1012382).
- qed: Fix possibility of list corruption during rmmod flows (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: LL2 flush isles when connection is closed (bsc#1019695 bsc#1019699 bsc#1022604).
- qede: Fix ref-cnt usage count (bsc#1019695 bsc#1019699 bsc#1022604).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).
- r8152: add Linksys USB3GIGV1 id (bnc#1012382).
- r8152: fix tx packets accounting (bnc#1012382).
- r8169: fix powering up RTL8168h (bnc#1012382).
- radeon: hide pointless #warning when compile testing (bnc#1012382).
- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).
- regulator: gpio: Fix some error handling paths in 'gpio_regulator_probe()' (bsc#1091960).
- regulator: of: Add a missing 'of_node_put()' in an error handling path of 'of_regulator_match()' (bnc#1012382).
- regulatory: add NUL to request alpha2 (bnc#1012382).
- resource: fix integer overflow at reallocation (bnc#1012382).
- rfkill: gpio: fix memory leak in probe error path (bnc#1012382).
- rpc_pipefs: fix double-dput() (bnc#1012382).
- rpm/config.sh: build against SP3 in OBS as well.
- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).
- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).
- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).
- rtl8187: Fix NULL pointer dereference in priv->conf_mutex (bnc#1012382).
- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).
- rtnetlink: validate attributes in do_setlink() (bnc#1012382).
- s390/alternative: use a copy of the facility bit mask (bnc#1012382).
- s390/cio: clear timer when terminating driver I/O (bnc#1012382).
- s390/cio: fix return code after missing interrupt (bnc#1012382).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero ( bnc#1012382 bnc#1094532).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1094532, ).
- s390/dasd: fix IO error for newly defined devices (bnc#1093144, ).
- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).
- s390/ftrace: use expoline for indirect branches (bnc#1012382).
- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).
- s390/kernel: use expoline for indirect branches (bnc#1012382).
- s390/lib: use expoline for indirect branches (bnc#1012382).
- s390/qdio: do not merge ERROR output buffers (bnc#1012382).
- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).
- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).
- s390/qdio: fix access to uninitialized qdio_q fields ( bnc#1012382 bnc#1094532).
- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1094532, ).
- s390/qeth: consolidate errno translation (bnc#1093144, ).
- s390/qeth: fix MAC address update sequence (bnc#1093144, ).
- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, ).
- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).
- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).
- s390: add assembler macros for CPU alternatives (bnc#1012382).
- s390: add automatic detection of the spectre defense (bnc#1012382).
- s390: add optimized array_index_mask_nospec (bnc#1012382).
- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).
- s390: add sysfs attributes for spectre (bnc#1012382).
- s390: correct module section names for expoline code revert (bnc#1012382).
- s390: correct nospec auto detection init order (bnc#1012382).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).
- s390: enable CPU alternatives unconditionally (bnc#1012382).
- s390: extend expoline to BC instructions (bnc#1012382).
- s390: introduce execute-trampolines for branches (bnc#1012382).
- s390: move expoline assembler macros to a header (bnc#1012382).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).
- s390: move spectre sysfs attribute code (bnc#1012382).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).
- s390: report spectre mitigation via syslog (bnc#1012382).
- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).
- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).
- s390: use expoline thunks in the BPF JIT (bnc#1012382).
- sched/rt: Fix rq->clock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).
- scsi: aacraid: Correct hba_send to include iu_type (bsc#1022607).
- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).
- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).
- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).
- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).
- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).
- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).
- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).
- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).
- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).
- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).
- scsi: mptsas: Disable WRITE SAME (bnc#1012382).
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).
- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).
- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).
- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).
- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).
- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).
- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).
- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).
- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).
- scsi: zfcp: fix infinite iteration on ERP ready list ( bnc#1012382 bnc#1094532).
- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1094532, ).
- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).
- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: fix the issue that the cookie-ack with auth can't get processed (bnc#1012382).
- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).
- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).
- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).
- selftests: Print the test we're running to /dev/kmsg (bnc#1012382).
- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).
- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).
- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).
- selftests: memfd: add config fragment for fuse (bnc#1012382).
- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).
- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: mctrl_gpio: Add missing module license (bnc#1012382).
- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).
- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).
- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).
- sh: New gcc support (bnc#1012382).
- sh: fix debug trap failure to process signals before return to user (bnc#1012382).
- signals: avoid unnecessary taking of sighand->siglock (-- Scheduler bnc#1012382 bnc#978907 performance signals).
- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).
- slip: Check if rstate is initialized before uncompressing (bnc#1012382).
- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).
- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).
- soreuseport: initialise timewait reuseport field (bnc#1012382).
- sparc64: Fix build warnings with gcc 7 (bnc#1012382).
- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).
- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).
- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).
- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).
- staging: rtl8192u: return -ENOMEM on failed allocation of priv->oldaddr (bnc#1012382).
- stm class: Use vmalloc for the master map (bnc#1012382).
- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).
- sunvnet: does not support GSO for sctp (bnc#1012382).
- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).
- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: do not read out-of-bounds opsize (bnc#1012382).
- tcp: fix TCP_REPAIR_QUEUE bound checking (bnc#1012382).
- tcp: ignore Fast Open on repair mode (bnc#1012382).
- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).
- tcp: purge write queue in tcp_connect_init() (bnc#1012382).
- team: avoid adding twice the same option to the event list (bnc#1012382).
- team: fix netconsole setup over team (bnc#1012382).
- team: use netdev_features_t instead of u32 (bnc#1012382).
- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).
- test_firmware: fix setting old custom fw path back on exit, second try (bnc#1012382).
- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).
- there is probably a place where forcing _IBRS_OFF is missed (or is too late) and therefore ENABLE_IBRS is sometimes called early during boot while it should not. Let's drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012
- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).
- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).
- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).
- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).
- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).
- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).
- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).
- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).
- tools/thermal: tmon: fix for segfault (bnc#1012382).
- tpm: do not suspend/resume if power stays on (bnc#1012382).
- tpm: self test failure should not cause suspend to fail (bnc#1012382).
- tracepoint: Do not warn on ENOMEM (bnc#1012382).
- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).
- tracing/uprobe_event: Fix strncpy corner case (bnc#1012382).
- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).
- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).
- tracing: Fix regex_match_front() to not over compare the test string (bnc#1012382).
- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).
- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).
- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).
- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bnc#1012382).
- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).
- ubi: Fix error for write access (bnc#1012382).
- ubi: Reject MLC NAND (bnc#1012382).
- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).
- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).
- udf: Provide saner default for invalid uid / gid (bnc#1012382).
- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).
- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).
- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).
- usb: dwc2: Fix interval type issue (bnc#1012382).
- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).
- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).
- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).
- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).
- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).
- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).
- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).
- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).
- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).
- usb: musb: fix enumeration after resume (bnc#1012382).
- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).
- usb: musb: host: fix potential NULL pointer dereference (bnc#1012382).
- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).
- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).
- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).
- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).
- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).
- vfio-pci: Virtualize PCIe and AF FLR (bnc#1012382).
- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).
- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).
- vfs: add path_has_submounts() (bsc#1086716).
- vfs: add path_is_mountpoint() helper (bsc#1086716).
- vfs: change d_manage() to take a struct path (bsc#1086716).
- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).
- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).
- virtio: add ability to iterate over vqs (bnc#1012382).
- virtio_console: free buffers after reset (bnc#1012382).
- vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi (bnc#1012382).
- vmscan: do not force-scan file lru if its absolute size is small (-- VM bnc#1012382 page performance reclaim).
- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).
- vti4: Do not count header length twice on tunnel setup (bnc#1012382).
- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).
- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).
- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).
- watchdog: hpwdt: Modify to use watchdog core (bsc#1085185).
- watchdog: hpwdt: Update Module info and copyright (bsc#1085185).
- watchdog: hpwdt: Update nmi_panic message (bsc#1085185).
- watchdog: hpwdt: condition early return of NMI handler on iLO5 (bsc#1085185).
- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).
- workqueue: use put_device() instead of kfree() (bnc#1012382).
- writeback: safer lock nesting (bnc#1012382).
- x86/apic: Set up through-local-APIC mode on the boot CPU if 'noapic' specified (bnc#1012382).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).
- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).
- x86/bugs: Respect retpoline command line option (bsc#1068032).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: make intel_rds_mask() honor X86_FEATURE_SSBD (bsc#1094019).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).
- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).
- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).
- x86/devicetree: Initialize device tree before using it (bnc#1012382).
- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).
- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).
- x86/fpu: Revert ('x86/fpu: Disable AVX when eagerfpu is off') (bnc#1012382).
- x86/hweight: Do not clobber %rdi (bnc#1012382).
- x86/hweight: Get rid of the special calling convention (bnc#1012382).
- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).
- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).
- x86/pkeys: Do not special case protection key 0 (1041740).
- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).
- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263).
- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263).
- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263).
- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).
- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263).
- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263).
- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263
- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263).
- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263).
- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).
- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).
- x86/topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).
- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).
- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xen-netfront: Fix race between device setup and open (bnc#1012382).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).
- xen/acpi: off by one in read_acpi_id() (bnc#1012382).
- xen/grant-table: Use put_page instead of free_page (bnc#1012382).
- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).
- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).
- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).
- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).
- xfrm_user: fix return value from xfrm_user_rcv_msg (bnc#1012382).
- xfs: always verify the log tail during recovery (bsc#1036215).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
- xfs: detect and trim torn writes during log recovery (bsc#1036215).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: fix endianness error when checking log block crc on big endian platforms (bsc#1094405, bsc#1036215).
- xfs: fix incorrect log_flushed on fsync (bnc#1012382).
- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).
- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).
- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).
- xfs: prevent creating negative-sized file via INSERT_RANGE (bnc#1012382).
- xfs: refactor and open code log record crc check (bsc#1036215).
- xfs: refactor log record start detection into a new helper (bsc#1036215).
- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).
- xfs: return start block of first bad log record during recovery (bsc#1036215).
- xfs: support a crc verification only log record pass (bsc#1036215).
- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).
- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).
- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).
- zorro: Set up z->dev.dma_mask for the DMA API (bnc#1012382).
Patchnames
SUSE-SLE-RT-12-SP3-2018-1224
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.138 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by\n calling setxattr twice with two different extended attribute names on the same\n file. This vulnerability could be triggered by an unprivileged user with the\n ability to create files and execute programs (bsc#1097234)\n- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086)\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2017-18249: The add_free_nid function did not properly track an allocated\n nid, which allowed local users to cause a denial of service (race condition) or\n possibly have unspecified other impact via concurrent threads (bnc#1087036)\n- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge\n option that triggers a NULL value for a flush_cmd_control data structure\n (bnc#1086400)\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers\n to obtain potentially sensitive information from kernel memory, aka a\n write_mmio stack-based out-of-bounds read (bnc#1073311)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution\n and speculative execution of memory reads the addresses of all prior memory\n writes are known may have allowed unauthorized disclosure of information to an\n attacker with local user access via a side-channel analysis, aka Speculative\n Store Bypass (SSB), Variant 4 (bsc#1087082).\n- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability\n allowing local users with access to the udldrmfb driver to obtain full read and\n write permissions on kernel physical pages, resulting in a code execution in\n kernel space (bsc#1090643).\n- CVE-2017-13305: Prevent information disclosure vulnerability in\n encrypted-keys (bsc#1094353)\n- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to\n cause a denial of service (out-of-bounds read and system crash) via a crafted\n ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers\n (bsc#1087095)\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007)\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012)\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904)\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900)\n- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob\n that contains a jump but lacks a user-defined chain, which allowed local users\n to cause a denial of service (NULL pointer dereference) by leveraging the\n CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650)\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962)\n- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that\n could have caused a crash and possibly memory corruption (bsc#1089895)\n\nThe following non-security bugs were fixed:\n\n- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).\n- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).\n- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).\n- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).\n- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).\n- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).\n- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).\n- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).\n- ALSA: aloop: Add missing cable lock to ctl API callbacks (bnc#1012382).\n- ALSA: aloop: Mark paused device as inactive (bnc#1012382).\n- ALSA: asihpi: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: control: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: control: fix a redundant-copy issue (bnc#1012382).\n- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).\n- ALSA: hda - New VIA controller suppor no-snoop path (bnc#1012382).\n- ALSA: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).\n- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).\n- ALSA: hda/realtek - Add some fixes for ALC233 (bnc#1012382).\n- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).\n- ALSA: hda: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: hdspm: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: line6: Use correct endpoint type for midi output (bnc#1012382).\n- ALSA: opl3: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).\n- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).\n- ALSA: pcm: Check PCM state at xfern compat ioctl (bnc#1012382).\n- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).\n- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).\n- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).\n- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).\n- ALSA: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).\n- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).\n- ALSA: rme9652: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bnc#1012382).\n- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).\n- ALSA: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).\n- ALSA: timer: Fix pause event notification (bnc#1012382 bsc#973378).\n- ALSA: timer: Fix pause event notification (bsc#973378).\n- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).\n- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).\n- ALSA: vmaster: Propagate slave error (bnc#1012382).\n- ARC: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).\n- ARM: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).\n- ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).\n- ARM: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).\n- ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).\n- ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).\n- ARM: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).\n- ARM: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).\n- ARM: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).\n- ARM: OMAP: Fix dmtimer init for omap1 (bnc#1012382).\n- ARM: amba: Do not read past the end of sysfs \u0027driver_override\u0027 buffer (bnc#1012382).\n- ARM: amba: Fix race condition with driver_override (bnc#1012382).\n- ARM: amba: Make driver_override output consistent with other buses (bnc#1012382).\n- ARM: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).\n- ARM: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).\n- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).\n- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).\n- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).\n- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).\n- ASoC: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).\n- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).\n- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).\n- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).\n- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).\n- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).\n- Btrfs: Fix possible softlock on single core machines (bnc#1012382).\n- Btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).\n- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).\n- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).\n- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).\n- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).\n- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).\n- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).\n- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).\n- Btrfs: fix xattr loss after power failure (bnc#1012382).\n- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).\n- Btrfs: set plug for fsync (bnc#1012382).\n- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).\n- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).\n- Correct the prefix in references tag in previous patches (bsc#1041740).\n- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).\n- ENABLE_IBRS clobbers %rax which it shouldn\u0027t do\n- Enable uinput driver (bsc#1092566).\n- Fix excessive newline in /proc/*/status (bsc#1094823).\n- Fixes typo for (watchdog: hpwdt: Update nmi_panic message) (bsc#1085185).\n- Force log to disk before reading the AGF during a fstrim (bnc#1012382).\n- HID: Fix hid_report_len usage (bnc#1012382).\n- HID: core: Fix size as type u32 (bnc#1012382).\n- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).\n- HID: i2c-hid: fix size check and type usage (bnc#1012382).\n- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).\n- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).\n- IB/mlx5: Use unlimited rate when static rate is not supported (bnc#1012382).\n- IB/srp: Fix completion vector assignment algorithm (bnc#1012382).\n- IB/srp: Fix srp_abort() (bnc#1012382).\n- Input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).\n- Input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).\n- Input: ALPS - fix trackstick button handling on V8 devices (git-fixes).\n- Input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).\n- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bnc#1012382).\n- Input: drv260x - fix initializing overdrive voltage (bnc#1012382).\n- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).\n- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).\n- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).\n- Input: leds - fix out of bound access (bnc#1012382).\n- KEYS: DNS: limit the length of option strings (bnc#1012382).\n- KVM: Fix spelling mistake: \u0027cop_unsuable\u0027 -\u003e \u0027cop_unusable\u0027 (bnc#1012382).\n- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).\n- KVM: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).\n- KVM: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).\n- KVM: s390: Enable all facility bits that are known good for passthrough (bnc#1012382 bsc#1073059 bsc#1076805).\n- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- KVM: x86: introduce linear_{read,write}_system (bnc#1012382).\n- KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).\n- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).\n- MIPS: Fix ptrace(2) PTRACE_PEEKUSR and PTRACE_POKEUSR accesses to o32 FGRs (bnc#1012382).\n- MIPS: Octeon: Fix logging messages with spurious periods after newlines (bnc#1012382).\n- MIPS: TXx9: use IS_BUILTIN() for CONFIG_LEDS_CLASS (bnc#1012382).\n- MIPS: ath79: Fix AR724X_PLL_REG_PCIE_CONFIG offset (bnc#1012382).\n- MIPS: memset.S: EVA and fault support for small_memset (bnc#1012382).\n- MIPS: memset.S: Fix clobber of v1 in last_fixup (bnc#1012382).\n- MIPS: memset.S: Fix return of __clear_user from Lpartial_fixup (bnc#1012382).\n- MIPS: prctl: Disallow FRE without FR with PR_SET_FP_MODE requests (bnc#1012382).\n- MIPS: ptrace: Expose FIR register through FP regset (bnc#1012382).\n- MIPS: ptrace: Fix PTRACE_PEEKUSR requests for 64-bit FGRs (bnc#1012382).\n- MIPS: uaccess: Add micromips clobbers to bzero invocation (bnc#1012382).\n- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bnc#1012382).\n- NFC: llcp: Limit size of SDP URI (bnc#1012382).\n- NFSv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).\n- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).\n- PCI: Restore config space on runtime resume despite being unbound (bnc#1012382).\n- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094268).\n- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).\n- RDMA/mlx5: Protect from shift operand overflow (bnc#1012382).\n- RDMA/qedr: Fix doorbell bar mapping for dpi \u003e 1 (bsc#1022604).\n- RDMA/ucma: Allow resolving address w/o specifying source address (bnc#1012382).\n- RDMA/ucma: Correct option size check using optlen (bnc#1012382).\n- RDMA/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).\n- RDS: IB: Fix null pointer issue (bnc#1012382).\n- Revert \u0027ARM: dts: imx6qdl-wandboard: Fix audio channel swap\u0027 (bnc#1012382).\n- Revert \u0027Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174\u0027 (bnc#1012382).\n- Revert \u0027KVM: Fix stack-out-of-bounds read in write_mmio\u0027 (bnc#1083635).\n- Revert \u0027ath10k: rebuild crypto header in rx data frames\u0027 (kabi).\n- Revert \u0027ath10k: send (re)assoc peer command when NSS changed\u0027 (bnc#1012382).\n- Revert \u0027bs-upload-kernel: do not set %opensuse_bs\u0027 This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.\n- Revert \u0027ima: limit file hash setting by user to fix and log modes\u0027 (bnc#1012382).\n- Revert \u0027ipc/shm: Fix shmat mmap nil-page protection\u0027 (bnc#1012382).\n- Revert \u0027perf tests: Decompress kernel module before objdump\u0027 (bnc#1012382).\n- Revert \u0027vti4: Do not override MTU passed on link creation via IFLA_MTU\u0027 (bnc#1012382).\n- Revert \u0027watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\u0027 This reverts commit 3e75a004de79c213a2c919144da3d413922661db.\n- Revert \u0027x86/fpu: Hard-disable lazy FPU mode\u0027 (compatibility).\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bnc#1012382 bsc#1092888).\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).\n- USB: Increment wakeup count on remote wakeup (bnc#1012382).\n- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).\n- USB: serial: cp210x: add ID for NI USB serial console (bnc#1012382).\n- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).\n- USB: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).\n- USB: serial: option: Add support for Quectel EP06 (bnc#1012382).\n- USB: serial: option: adding support for ublox R410M (bnc#1012382).\n- USB: serial: option: reimplement interface masking (bnc#1012382).\n- USB: serial: simple: add libtransistor console (bnc#1012382).\n- USB: serial: visor: handle potential invalid device configuration (bnc#1012382).\n- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).\n- Update config files, add expoline for s390x (bsc#1089393).\n- af_key: Always verify length of provided sadb_key (bnc#1012382).\n- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).\n- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).\n- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).\n- arm64: Add \u0027ssbd\u0027 command-line option (bsc#1085308).\n- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).\n- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).\n- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).\n- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).\n- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).\n- arm64: alternatives: Add dynamic patching feature (bsc#1085308).\n- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).\n- arm64: do not call C code with el0\u0027s fp register (bsc#1085308).\n- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).\n- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).\n- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).\n- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).\n- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).\n- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).\n- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).\n- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).\n- asm-generic: provide generic_pmdp_establish() (bnc#1012382).\n- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).\n- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).\n- ath10k: rebuild crypto header in rx data frames (bnc#1012382).\n- ath9k_hw: check if the chip failed to wake up (bnc#1012382).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).\n- audit: return on memory error to avoid null pointer dereference (bnc#1012382).\n- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).\n- autofs: change autofs4_wait() to take struct path (bsc#1086716).\n- autofs: mount point create should honour passed in mode (bnc#1012382).\n- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).\n- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).\n- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).\n- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).\n- batman-adv: fix packet checksum in receive path (bnc#1012382).\n- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).\n- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).\n- bcache: fix for allocator and register thread race (bnc#1012382).\n- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).\n- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).\n- bcache: return attach error when no cache set exist (bnc#1012382).\n- bdi: Fix oops in wb_workfn() (bnc#1012382).\n- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)\n- block/loop: fix deadlock after loop_set_status (bnc#1012382).\n- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).\n- block: sanity check for integrity intervals (bsc#1091728).\n- bnx2x: use the right constant (bnc#1012382).\n- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).\n- bonding: do not allow rlb updates to invalid mac (bnc#1012382).\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).\n- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).\n- bpf: map_get_next_key to return first key on NULL (bnc#1012382).\n- brcmfmac: Fix check for ISO3166 code (bnc#1012382).\n- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).\n- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bnc#1012382).\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).\n- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).\n- ceph: adding protection for showing cap reservation info (bsc#1089115).\n- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).\n- ceph: check if mds create snaprealm when setting quota (bsc#1089115).\n- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).\n- ceph: do not check quota for snap inode (bsc#1089115).\n- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).\n- ceph: fix race of queuing delayed caps (bsc#1096214).\n- ceph: fix root quota realm check (bsc#1089115).\n- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).\n- ceph: fix st_nlink stat for directories (bsc#1093904).\n- ceph: quota: add counter for snaprealms with quota (bsc#1089115).\n- ceph: quota: add initial infrastructure to support cephfs quotas (bsc#1089115).\n- ceph: quota: cache inode pointer in ceph_snap_realm (bsc#1089115).\n- ceph: quota: do not allow cross-quota renames (bsc#1089115).\n- ceph: quota: report root dir quota usage in statfs (bsc#1089115).\n- ceph: quota: support for ceph.quota.max_bytes (bsc#1089115).\n- ceph: quota: support for ceph.quota.max_files (bsc#1089115).\n- ceph: quota: update MDS when max_bytes is approaching (bsc#1089115).\n- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).\n- cfg80211: further limit wiphy names to 64 bytes (git-fixes).\n- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).\n- cifs: Use file_dentry() (bsc#1093008).\n- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).\n- clk: Do not show the incorrect clock phase (bnc#1012382).\n- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).\n- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).\n- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).\n- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).\n- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).\n- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).\n- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).\n- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).\n- config: arm64: enable Spectre-v4 per-thread mitigation\n- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).\n- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).\n- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).\n- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).\n- crypto: af_alg - fix possible uninit-value in alg_bind() (bnc#1012382).\n- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).\n- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).\n- cxgb4: Setup FW queues before registering netdev (bsc#1022743).\n- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).\n- dccp: fix tasklet usage (bnc#1012382).\n- dccp: initialize ireq-\u003eir_mark (bnc#1012382).\n- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).\n- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).\n- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).\n- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).\n- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).\n- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).\n- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).\n- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).\n- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).\n- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).\n- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).\n- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).\n- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).\n- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).\n- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).\n- drm/virtio: fix vq wait_event condition (bnc#1012382).\n- drm/vmwgfx: Fix a buffer object leak (bnc#1012382).\n- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).\n- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).\n- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).\n- efi: Avoid potential crashes, fix the \u0027struct efi_pci_io_protocol_32\u0027 definition for mixed mode (bnc#1012382).\n- enic: enable rq before updating rq descriptors (bnc#1012382).\n- enic: set DMA mask to 47 bit (bnc#1012382).\n- ext2: fix a block leak (bnc#1012382).\n- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ext4: add validity checks for bitmap block numbers (bnc#1012382).\n- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).\n- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).\n- ext4: fix bitmap position validation (bnc#1012382).\n- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).\n- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).\n- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).\n- fanotify: fix logic of events on child (bnc#1012382).\n- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).\n- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).\n- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).\n- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).\n- fix io_destroy()/aio_complete() race (bnc#1012382).\n- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).\n- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).\n- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).\n- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).\n- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).\n- futex: futex_wake_op, do not fail on invalid op (git-fixes).\n- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).\n- getname_kernel() needs to make sure that -\u003ename != -\u003einame in long case (bnc#1012382).\n- gfs2: Fix fallocate chunk size (bnc#1012382).\n- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).\n- gpio: No NULL owner (bnc#1012382).\n- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).\n- gpmi-nand: Handle ECC Errors in erased pages (bnc#1012382).\n- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).\n- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).\n- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).\n- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).\n- hwrng: stm32 - add reset during probe (bnc#1012382).\n- hwtracing: stm: fix build error on some arches (bnc#1012382).\n- hypfs_kill_super(): deal with failed allocations (bnc#1012382).\n- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).\n- i2c: rcar: check master irqs before slave irqs (bnc#1012382).\n- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).\n- i2c: rcar: init new messages in irq (bnc#1012382).\n- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).\n- i2c: rcar: refactor setup of a msg (bnc#1012382).\n- i2c: rcar: remove spinlock (bnc#1012382).\n- i2c: rcar: remove unused IOERROR state (bnc#1012382).\n- i2c: rcar: revoke START request early (bnc#1012382).\n- i2c: rcar: rework hw init (bnc#1012382).\n- ibmvnic: Check CRQ command return codes (bsc#1094840).\n- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).\n- ibmvnic: Create separate initialization routine for resets (bsc#1094840).\n- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).\n- ibmvnic: Fix partial success login retries (bsc#1094840).\n- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).\n- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).\n- ibmvnic: Handle error case when setting link state (bsc#1094840).\n- ibmvnic: Introduce active CRQ state (bsc#1094840).\n- ibmvnic: Introduce hard reset recovery (bsc#1094840).\n- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).\n- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).\n- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).\n- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).\n- iio:kfifo_buf: check for uint overflow (bnc#1012382).\n- ima: Fallback to the builtin hash algorithm (bnc#1012382).\n- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).\n- init: fix false positives in W+X checking (bsc#1096982).\n- iommu/vt-d: Fix a potential memory leak (bnc#1012382).\n- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).\n- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).\n- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).\n- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).\n- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799).\n- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).\n- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).\n- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).\n- ipv4: remove warning in ip_recv_error (bnc#1012382).\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).\n- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (bnc#1012382).\n- irda: fix overly long udelay() (bnc#1012382).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).\n- isdn: eicon: fix a missing-check bug (bnc#1012382).\n- jbd2: fix use after free in kjournald2() (bnc#1012382).\n- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).\n- jffs2: Fix use-after-free bug in jffs2_iget()\u0027s error handling path (bnc#1012382 git-fixes).\n- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).\n- kABI: work around BPF SSBD removal (bsc#1087082).\n- kabi: vfs: Restore dentry_operations-\u003ed_manage (bsc#1086716).\n- kasan: fix memory hotplug during boot (bnc#1012382).\n- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).\n- kconfig: Do not leak main menus during parsing (bnc#1012382).\n- kconfig: Fix automatic menu creation mem leak (bnc#1012382).\n- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).\n- kdb: make \u0027mdr\u0027 command repeat (bnc#1012382).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).\n- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).\n- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, ).\n- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).\n- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).\n- kobject: do not use WARN for registration failures (bnc#1012382).\n- kvm: Fix nopvspin static branch init usage (bsc#1056427).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).\n- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).\n- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bnc#1012382).\n- lan78xx: Correctly indicate invalid OTP (bnc#1012382).\n- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bnc#1012382).\n- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).\n- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).\n- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).\n- libceph: fix misjudgement of maximum monitor number (bsc#1089115).\n- libceph: reschedule a tick in finish_hunting() (bsc#1089115).\n- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).\n- libceph: validate con-\u003estate at the top of try_write() (bsc#1089115).\n- libnvdimm, dax: fix 1GB-aligned namespaces vs physical misalignment\n- libnvdimm, namespace: use a safe lookup for dimm device name\n- libnvdimm, pfn: fix start_pad handling for aligned namespaces\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299).\n- llc: better deal with too small mtu (bnc#1012382).\n- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).\n- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).\n- llc: hold llc_sap before release_sock() (bnc#1012382).\n- llc: properly handle dev_queue_xmit() return value (bnc#1012382).\n- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).\n- locking/qspinlock: Ensure node-\u003ecount is updated before initialising node (bnc#1012382).\n- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).\n- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).\n- loop: handle short DIO reads (bsc#1094177).\n- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).\n- mac80211: Add RX flag to indicate ICV stripped (bnc#1012382).\n- mac80211: allow not sending MIC up from driver for HW crypto (bnc#1012382).\n- mac80211: allow same PN for AMSDU sub-frames (bnc#1012382).\n- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).\n- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).\n- md/raid1: fix NULL pointer dereference (bnc#1012382).\n- md: document lifetime of internal rdev pointer (bsc#1056415).\n- md: fix two problems with setting the \u0027re-add\u0027 device state (bsc#1089023).\n- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).\n- md: raid5: avoid string overflow warning (bnc#1012382).\n- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).\n- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).\n- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).\n- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).\n- media: em28xx: USB bulk packet size fix (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).\n- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).\n- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).\n- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).\n- mm/ksm: fix interaction with THP (bnc#1012382).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).\n- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).\n- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).\n- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).\n- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (-- VM bnc#1012382 bnc#971975 generic performance read).\n- mm: filemap: remove redundant code in do_read_cache_page (-- VM bnc#1012382 bnc#971975 generic performance read).\n- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).\n- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).\n- mmap: introduce sane default mmap limits (bnc#1012382).\n- mmap: relax file size limit for regular files (bnc#1012382).\n- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).\n- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).\n- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).\n- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).\n- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).\n- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).\n- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).\n- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).\n- net/mlx5: Protect from command bit overflow (bnc#1012382).\n- net/packet: refine check for priv area size (bnc#1012382).\n- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).\n- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).\n- net: Fix untag for vlan packets without ethernet header (bnc#1012382).\n- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).\n- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).\n- net: atm: Fix potential Spectre v1 (bnc#1012382).\n- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).\n- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).\n- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).\n- net: fix rtnh_ok() (bnc#1012382).\n- net: fix uninit-value in __hw_addr_add_ex() (bnc#1012382).\n- net: initialize skb-\u003epeeked when cloning (bnc#1012382).\n- net: metrics: add proper netlink validation (bnc#1012382).\n- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).\n- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).\n- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).\n- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).\n- net: test tailroom before appending to linear skb (bnc#1012382).\n- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).\n- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).\n- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).\n- netdev-FAQ: clarify DaveM\u0027s position for stable backports (bnc#1012382).\n- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).\n- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).\n- netlink: fix uninit-value in netlink_sendmsg (bnc#1012382).\n- nfit, address-range-scrub: fix scrub in-progress reporting\n- nfit: fix region registration vs block-data-window ranges\n- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).\n- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).\n- nvme-pci: Fix EEH failure on ppc (bsc#1093533).\n- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).\n- nvme: target: fix buffer overflow (bsc#993388).\n- ocfs2/acl: use \u0027ip_xattr_sem\u0027 to protect getting extended attribute (bnc#1012382).\n- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).\n- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).\n- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1070404).\n- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).\n- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).\n- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).\n- packet: fix bitfield update race (bnc#1012382).\n- packet: fix reserve calculation (bnc#1012382 git-fixes).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (bnc#1012382).\n- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).\n- parisc: Fix out of array access in match_pci_device() (bnc#1012382).\n- percpu: include linux/sched.h for cond_resched() (bnc#1012382).\n- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).\n- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).\n- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).\n- perf intel-pt: Fix sync_switch (bnc#1012382).\n- perf intel-pt: Fix timestamp following overflow (bnc#1012382).\n- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).\n- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).\n- perf/cgroup: Fix child event counting bug (bnc#1012382).\n- perf/core: Fix perf_output_read_group() (bnc#1012382).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages[] (bnc#1012382).\n- perf/core: Fix the perf_cpu_time_max_percent check (bnc#1012382).\n- perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr (bnc#1012382).\n- perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver (bnc#1012382).\n- perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (bnc#1012382).\n- perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (bnc#1012382).\n- perf: Remove superfluous allocation error check (bnc#1012382).\n- perf: Return proper values for user stack errors (bnc#1012382).\n- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).\n- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Clear PCR on boot (bnc#1012382).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).\n- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).\n- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).\n- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).\n- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).\n- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).\n- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).\n- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).\n- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).\n- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).\n- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).\n- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).\n- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).\n- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).\n- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).\n- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).\n- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).\n- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).\n- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).\n- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).\n- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041). \n- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n- powerpc: conditionally compile platform-specific serial drivers (bsc#1066223).\n- powerpc: signals: Discard transaction state from signal frames (bsc#1094059).\n- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).\n- proc read mm\u0027s {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).\n- proc: fix /proc/*/map_files lookup (bnc#1012382).\n- proc: meminfo: estimate available memory more conservatively (-- VM bnc#1012382 functionality monitoring space user).\n- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).\n- qed: Fix LL2 race during connection terminate (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix mask for physical address in ILT entry (bnc#1012382).\n- qed: Fix possibility of list corruption during rmmod flows (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: LL2 flush isles when connection is closed (bsc#1019695 bsc#1019699 bsc#1022604).\n- qede: Fix ref-cnt usage count (bsc#1019695 bsc#1019699 bsc#1022604).\n- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).\n- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).\n- r8152: add Linksys USB3GIGV1 id (bnc#1012382).\n- r8152: fix tx packets accounting (bnc#1012382).\n- r8169: fix powering up RTL8168h (bnc#1012382).\n- radeon: hide pointless #warning when compile testing (bnc#1012382).\n- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).\n- regulator: gpio: Fix some error handling paths in \u0027gpio_regulator_probe()\u0027 (bsc#1091960).\n- regulator: of: Add a missing \u0027of_node_put()\u0027 in an error handling path of \u0027of_regulator_match()\u0027 (bnc#1012382).\n- regulatory: add NUL to request alpha2 (bnc#1012382).\n- resource: fix integer overflow at reallocation (bnc#1012382).\n- rfkill: gpio: fix memory leak in probe error path (bnc#1012382).\n- rpc_pipefs: fix double-dput() (bnc#1012382).\n- rpm/config.sh: build against SP3 in OBS as well.\n- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).\n- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).\n- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).\n- rtl8187: Fix NULL pointer dereference in priv-\u003econf_mutex (bnc#1012382).\n- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).\n- rtnetlink: validate attributes in do_setlink() (bnc#1012382).\n- s390/alternative: use a copy of the facility bit mask (bnc#1012382).\n- s390/cio: clear timer when terminating driver I/O (bnc#1012382).\n- s390/cio: fix return code after missing interrupt (bnc#1012382).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero ( bnc#1012382 bnc#1094532).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1094532, ).\n- s390/dasd: fix IO error for newly defined devices (bnc#1093144, ).\n- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).\n- s390/ftrace: use expoline for indirect branches (bnc#1012382).\n- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).\n- s390/kernel: use expoline for indirect branches (bnc#1012382).\n- s390/lib: use expoline for indirect branches (bnc#1012382).\n- s390/qdio: do not merge ERROR output buffers (bnc#1012382).\n- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).\n- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).\n- s390/qdio: fix access to uninitialized qdio_q fields ( bnc#1012382 bnc#1094532).\n- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1094532, ).\n- s390/qeth: consolidate errno translation (bnc#1093144, ).\n- s390/qeth: fix MAC address update sequence (bnc#1093144, ).\n- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, ).\n- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).\n- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).\n- s390: add assembler macros for CPU alternatives (bnc#1012382).\n- s390: add automatic detection of the spectre defense (bnc#1012382).\n- s390: add optimized array_index_mask_nospec (bnc#1012382).\n- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).\n- s390: add sysfs attributes for spectre (bnc#1012382).\n- s390: correct module section names for expoline code revert (bnc#1012382).\n- s390: correct nospec auto detection init order (bnc#1012382).\n- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).\n- s390: enable CPU alternatives unconditionally (bnc#1012382).\n- s390: extend expoline to BC instructions (bnc#1012382).\n- s390: introduce execute-trampolines for branches (bnc#1012382).\n- s390: move expoline assembler macros to a header (bnc#1012382).\n- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).\n- s390: move spectre sysfs attribute code (bnc#1012382).\n- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).\n- s390: report spectre mitigation via syslog (bnc#1012382).\n- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).\n- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).\n- s390: use expoline thunks in the BPF JIT (bnc#1012382).\n- sched/rt: Fix rq-\u003eclock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).\n- scsi: aacraid: Correct hba_send to include iu_type (bsc#1022607).\n- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).\n- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).\n- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).\n- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).\n- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).\n- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).\n- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).\n- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).\n- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).\n- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).\n- scsi: mptsas: Disable WRITE SAME (bnc#1012382).\n- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).\n- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).\n- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).\n- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).\n- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).\n- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).\n- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).\n- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).\n- scsi: zfcp: fix infinite iteration on ERP ready list ( bnc#1012382 bnc#1094532).\n- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1094532, ).\n- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).\n- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: fix the issue that the cookie-ack with auth can\u0027t get processed (bnc#1012382).\n- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).\n- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).\n- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).\n- selftests: Print the test we\u0027re running to /dev/kmsg (bnc#1012382).\n- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).\n- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).\n- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).\n- selftests: memfd: add config fragment for fuse (bnc#1012382).\n- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).\n- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).\n- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).\n- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: mctrl_gpio: Add missing module license (bnc#1012382).\n- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).\n- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).\n- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).\n- sh: New gcc support (bnc#1012382).\n- sh: fix debug trap failure to process signals before return to user (bnc#1012382).\n- signals: avoid unnecessary taking of sighand-\u003esiglock (-- Scheduler bnc#1012382 bnc#978907 performance signals).\n- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).\n- slip: Check if rstate is initialized before uncompressing (bnc#1012382).\n- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).\n- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).\n- soreuseport: initialise timewait reuseport field (bnc#1012382).\n- sparc64: Fix build warnings with gcc 7 (bnc#1012382).\n- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).\n- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).\n- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).\n- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).\n- staging: rtl8192u: return -ENOMEM on failed allocation of priv-\u003eoldaddr (bnc#1012382).\n- stm class: Use vmalloc for the master map (bnc#1012382).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).\n- sunvnet: does not support GSO for sctp (bnc#1012382).\n- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).\n- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).\n- tcp: do not read out-of-bounds opsize (bnc#1012382).\n- tcp: fix TCP_REPAIR_QUEUE bound checking (bnc#1012382).\n- tcp: ignore Fast Open on repair mode (bnc#1012382).\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).\n- tcp: purge write queue in tcp_connect_init() (bnc#1012382).\n- team: avoid adding twice the same option to the event list (bnc#1012382).\n- team: fix netconsole setup over team (bnc#1012382).\n- team: use netdev_features_t instead of u32 (bnc#1012382).\n- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).\n- test_firmware: fix setting old custom fw path back on exit, second try (bnc#1012382).\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).\n- there is probably a place where forcing _IBRS_OFF is missed (or is too late) and therefore ENABLE_IBRS is sometimes called early during boot while it should not. Let\u0027s drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012\n- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).\n- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).\n- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).\n- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).\n- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).\n- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).\n- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).\n- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).\n- tools/thermal: tmon: fix for segfault (bnc#1012382).\n- tpm: do not suspend/resume if power stays on (bnc#1012382).\n- tpm: self test failure should not cause suspend to fail (bnc#1012382).\n- tracepoint: Do not warn on ENOMEM (bnc#1012382).\n- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).\n- tracing/uprobe_event: Fix strncpy corner case (bnc#1012382).\n- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).\n- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).\n- tracing: Fix regex_match_front() to not over compare the test string (bnc#1012382).\n- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).\n- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bnc#1012382).\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).\n- ubi: Fix error for write access (bnc#1012382).\n- ubi: Reject MLC NAND (bnc#1012382).\n- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).\n- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).\n- udf: Provide saner default for invalid uid / gid (bnc#1012382).\n- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).\n- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).\n- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).\n- usb: dwc2: Fix interval type issue (bnc#1012382).\n- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).\n- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).\n- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).\n- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).\n- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).\n- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).\n- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).\n- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).\n- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).\n- usb: musb: fix enumeration after resume (bnc#1012382).\n- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).\n- usb: musb: host: fix potential NULL pointer dereference (bnc#1012382).\n- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).\n- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).\n- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).\n- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).\n- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).\n- vfio-pci: Virtualize PCIe and AF FLR (bnc#1012382).\n- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).\n- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).\n- vfs: add path_has_submounts() (bsc#1086716).\n- vfs: add path_is_mountpoint() helper (bsc#1086716).\n- vfs: change d_manage() to take a struct path (bsc#1086716).\n- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).\n- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).\n- virtio: add ability to iterate over vqs (bnc#1012382).\n- virtio_console: free buffers after reset (bnc#1012382).\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (bnc#1012382).\n- vmscan: do not force-scan file lru if its absolute size is small (-- VM bnc#1012382 page performance reclaim).\n- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).\n- vti4: Do not count header length twice on tunnel setup (bnc#1012382).\n- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).\n- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).\n- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).\n- watchdog: hpwdt: Modify to use watchdog core (bsc#1085185).\n- watchdog: hpwdt: Update Module info and copyright (bsc#1085185).\n- watchdog: hpwdt: Update nmi_panic message (bsc#1085185).\n- watchdog: hpwdt: condition early return of NMI handler on iLO5 (bsc#1085185).\n- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).\n- workqueue: use put_device() instead of kfree() (bnc#1012382).\n- writeback: safer lock nesting (bnc#1012382).\n- x86/apic: Set up through-local-APIC mode on the boot CPU if \u0027noapic\u0027 specified (bnc#1012382).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).\n- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).\n- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).\n- x86/bugs: Respect retpoline command line option (bsc#1068032).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/bugs: make intel_rds_mask() honor X86_FEATURE_SSBD (bsc#1094019).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).\n- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).\n- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).\n- x86/devicetree: Initialize device tree before using it (bnc#1012382).\n- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).\n- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).\n- x86/fpu: Revert (\u0027x86/fpu: Disable AVX when eagerfpu is off\u0027) (bnc#1012382).\n- x86/hweight: Do not clobber %rdi (bnc#1012382).\n- x86/hweight: Get rid of the special calling convention (bnc#1012382).\n- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)\n- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).\n- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).\n- x86/pkeys: Do not special case protection key 0 (1041740).\n- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).\n- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263).\n- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263).\n- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263).\n- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).\n- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263).\n- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263).\n- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263\n- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263).\n- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263).\n- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).\n- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).\n- x86/topology: Update the \u0027cpu cores\u0027 field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).\n- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).\n- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).\n- xen-netfront: Fix hang on device removal (bnc#1012382).\n- xen-netfront: Fix race between device setup and open (bnc#1012382).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).\n- xen/acpi: off by one in read_acpi_id() (bnc#1012382).\n- xen/grant-table: Use put_page instead of free_page (bnc#1012382).\n- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).\n- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).\n- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).\n- xfrm_user: fix return value from xfrm_user_rcv_msg (bnc#1012382).\n- xfs: always verify the log tail during recovery (bsc#1036215).\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).\n- xfs: detect and trim torn writes during log recovery (bsc#1036215).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n- xfs: fix endianness error when checking log block crc on big endian platforms (bsc#1094405, bsc#1036215).\n- xfs: fix incorrect log_flushed on fsync (bnc#1012382).\n- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).\n- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).\n- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bnc#1012382).\n- xfs: refactor and open code log record crc check (bsc#1036215).\n- xfs: refactor log record start detection into a new helper (bsc#1036215).\n- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).\n- xfs: return start block of first bad log record during recovery (bsc#1036215).\n- xfs: support a crc verification only log record pass (bsc#1036215).\n- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).\n- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).\n- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).\n- zorro: Set up z-\u003edev.dma_mask for the DMA API (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP3-2018-1224", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1816-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1816-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1816-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" }, { "category": "self", "summary": "SUSE Bug 1009062", "url": "https://bugzilla.suse.com/1009062" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1019695", "url": "https://bugzilla.suse.com/1019695" }, { "category": "self", "summary": "SUSE Bug 1019699", "url": "https://bugzilla.suse.com/1019699" }, { "category": "self", "summary": "SUSE Bug 1022604", "url": "https://bugzilla.suse.com/1022604" }, { "category": "self", "summary": "SUSE Bug 1022607", "url": "https://bugzilla.suse.com/1022607" }, { "category": "self", "summary": "SUSE Bug 1022743", "url": "https://bugzilla.suse.com/1022743" }, { "category": "self", "summary": "SUSE Bug 1024718", "url": "https://bugzilla.suse.com/1024718" }, { "category": "self", "summary": "SUSE Bug 1031717", "url": "https://bugzilla.suse.com/1031717" }, { "category": "self", "summary": "SUSE Bug 1035432", "url": "https://bugzilla.suse.com/1035432" }, { "category": "self", "summary": "SUSE Bug 1036215", "url": "https://bugzilla.suse.com/1036215" }, { "category": "self", "summary": "SUSE Bug 1041740", "url": "https://bugzilla.suse.com/1041740" }, { "category": "self", "summary": "SUSE Bug 1043598", "url": "https://bugzilla.suse.com/1043598" }, { "category": "self", "summary": "SUSE Bug 1044596", "url": "https://bugzilla.suse.com/1044596" }, { "category": "self", "summary": "SUSE Bug 1045330", "url": "https://bugzilla.suse.com/1045330" }, { "category": "self", "summary": "SUSE Bug 1056415", "url": "https://bugzilla.suse.com/1056415" }, { "category": "self", "summary": "SUSE Bug 1056427", "url": "https://bugzilla.suse.com/1056427" }, { "category": "self", "summary": "SUSE Bug 1060799", "url": "https://bugzilla.suse.com/1060799" }, { "category": "self", "summary": "SUSE Bug 1066223", "url": "https://bugzilla.suse.com/1066223" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1068054", "url": "https://bugzilla.suse.com/1068054" }, { "category": "self", "summary": "SUSE Bug 1068951", "url": "https://bugzilla.suse.com/1068951" }, { "category": "self", "summary": "SUSE Bug 1070404", "url": "https://bugzilla.suse.com/1070404" }, { "category": "self", "summary": "SUSE Bug 1073059", "url": "https://bugzilla.suse.com/1073059" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1075087", "url": "https://bugzilla.suse.com/1075087" }, { "category": "self", "summary": "SUSE Bug 1075428", "url": "https://bugzilla.suse.com/1075428" }, { "category": "self", "summary": "SUSE Bug 1076049", "url": "https://bugzilla.suse.com/1076049" }, { "category": "self", "summary": "SUSE Bug 1076263", "url": "https://bugzilla.suse.com/1076263" }, { "category": "self", "summary": "SUSE Bug 1076805", "url": "https://bugzilla.suse.com/1076805" }, { "category": "self", "summary": "SUSE Bug 1078583", "url": "https://bugzilla.suse.com/1078583" }, { "category": "self", "summary": "SUSE Bug 1079152", "url": "https://bugzilla.suse.com/1079152" }, { "category": "self", "summary": "SUSE Bug 1080157", "url": "https://bugzilla.suse.com/1080157" }, { "category": "self", "summary": "SUSE Bug 1080542", "url": "https://bugzilla.suse.com/1080542" }, { "category": "self", "summary": "SUSE Bug 1080656", "url": "https://bugzilla.suse.com/1080656" }, { "category": "self", "summary": "SUSE Bug 1081500", "url": "https://bugzilla.suse.com/1081500" }, { "category": "self", "summary": "SUSE Bug 1081514", "url": "https://bugzilla.suse.com/1081514" }, { "category": "self", "summary": "SUSE Bug 1081599", "url": "https://bugzilla.suse.com/1081599" }, { "category": "self", "summary": "SUSE Bug 1082153", "url": "https://bugzilla.suse.com/1082153" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1082485", "url": "https://bugzilla.suse.com/1082485" }, { "category": "self", "summary": "SUSE Bug 1082504", "url": "https://bugzilla.suse.com/1082504" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1082979", "url": "https://bugzilla.suse.com/1082979" }, { "category": "self", "summary": "SUSE Bug 1083635", "url": "https://bugzilla.suse.com/1083635" }, { "category": "self", "summary": "SUSE Bug 1083650", "url": "https://bugzilla.suse.com/1083650" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1084721", "url": "https://bugzilla.suse.com/1084721" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1086400", "url": "https://bugzilla.suse.com/1086400" }, { "category": "self", "summary": "SUSE Bug 1086716", "url": "https://bugzilla.suse.com/1086716" }, { "category": "self", "summary": "SUSE Bug 1087007", "url": "https://bugzilla.suse.com/1087007" }, { "category": "self", "summary": "SUSE Bug 1087012", "url": "https://bugzilla.suse.com/1087012" }, { "category": "self", "summary": "SUSE Bug 1087036", "url": "https://bugzilla.suse.com/1087036" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087086", "url": "https://bugzilla.suse.com/1087086" }, { "category": "self", "summary": "SUSE Bug 1087095", "url": "https://bugzilla.suse.com/1087095" }, { "category": "self", "summary": "SUSE Bug 1088810", "url": "https://bugzilla.suse.com/1088810" }, { "category": "self", "summary": "SUSE Bug 1088871", "url": "https://bugzilla.suse.com/1088871" }, { "category": "self", "summary": "SUSE Bug 1089023", "url": "https://bugzilla.suse.com/1089023" }, { "category": "self", "summary": "SUSE Bug 1089115", "url": "https://bugzilla.suse.com/1089115" }, { "category": "self", "summary": "SUSE Bug 1089393", "url": "https://bugzilla.suse.com/1089393" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1090225", "url": "https://bugzilla.suse.com/1090225" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1090534", "url": "https://bugzilla.suse.com/1090534" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE Bug 1090658", "url": "https://bugzilla.suse.com/1090658" }, { "category": "self", "summary": "SUSE Bug 1090663", "url": "https://bugzilla.suse.com/1090663" }, { "category": "self", "summary": "SUSE Bug 1090708", "url": "https://bugzilla.suse.com/1090708" }, { "category": "self", "summary": "SUSE Bug 1090718", "url": "https://bugzilla.suse.com/1090718" }, { "category": "self", "summary": "SUSE Bug 1090734", "url": "https://bugzilla.suse.com/1090734" }, { "category": "self", "summary": "SUSE Bug 1090953", "url": "https://bugzilla.suse.com/1090953" }, { "category": "self", "summary": "SUSE Bug 1090955", "url": "https://bugzilla.suse.com/1090955" }, { "category": "self", "summary": "SUSE Bug 1091041", "url": "https://bugzilla.suse.com/1091041" }, { "category": "self", "summary": "SUSE Bug 1091325", "url": "https://bugzilla.suse.com/1091325" }, { "category": "self", "summary": "SUSE Bug 1091594", "url": "https://bugzilla.suse.com/1091594" }, { "category": "self", "summary": "SUSE Bug 1091728", "url": "https://bugzilla.suse.com/1091728" }, { "category": "self", "summary": "SUSE Bug 1091960", "url": "https://bugzilla.suse.com/1091960" }, { "category": "self", "summary": "SUSE Bug 1092289", "url": "https://bugzilla.suse.com/1092289" }, { "category": "self", "summary": "SUSE Bug 1092497", "url": "https://bugzilla.suse.com/1092497" }, { "category": "self", "summary": "SUSE Bug 1092552", "url": "https://bugzilla.suse.com/1092552" }, { "category": "self", "summary": "SUSE Bug 1092566", "url": "https://bugzilla.suse.com/1092566" }, { "category": "self", "summary": "SUSE Bug 1092772", "url": "https://bugzilla.suse.com/1092772" }, { "category": "self", "summary": "SUSE Bug 1092813", "url": "https://bugzilla.suse.com/1092813" }, { "category": "self", "summary": "SUSE Bug 1092888", "url": "https://bugzilla.suse.com/1092888" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1092975", "url": "https://bugzilla.suse.com/1092975" }, { "category": "self", "summary": "SUSE Bug 1093008", "url": "https://bugzilla.suse.com/1093008" }, { "category": "self", "summary": "SUSE Bug 1093035", "url": "https://bugzilla.suse.com/1093035" }, { "category": "self", "summary": "SUSE Bug 1093144", "url": "https://bugzilla.suse.com/1093144" }, { "category": "self", "summary": "SUSE Bug 1093215", "url": "https://bugzilla.suse.com/1093215" }, { "category": "self", "summary": "SUSE Bug 1093533", "url": "https://bugzilla.suse.com/1093533" }, { "category": "self", "summary": "SUSE Bug 1093904", "url": "https://bugzilla.suse.com/1093904" }, { "category": "self", "summary": "SUSE Bug 1093990", "url": "https://bugzilla.suse.com/1093990" }, { "category": "self", "summary": "SUSE Bug 1094019", "url": "https://bugzilla.suse.com/1094019" }, { "category": "self", "summary": "SUSE Bug 1094033", "url": "https://bugzilla.suse.com/1094033" }, { "category": "self", "summary": "SUSE Bug 1094059", "url": "https://bugzilla.suse.com/1094059" }, { "category": "self", "summary": "SUSE Bug 1094177", "url": "https://bugzilla.suse.com/1094177" }, { "category": "self", "summary": "SUSE Bug 1094268", "url": "https://bugzilla.suse.com/1094268" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1094356", "url": "https://bugzilla.suse.com/1094356" }, { "category": "self", "summary": "SUSE Bug 1094405", "url": "https://bugzilla.suse.com/1094405" }, { "category": "self", "summary": "SUSE Bug 1094466", "url": "https://bugzilla.suse.com/1094466" }, { "category": "self", "summary": "SUSE Bug 1094532", "url": "https://bugzilla.suse.com/1094532" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1094840", "url": "https://bugzilla.suse.com/1094840" }, { "category": "self", "summary": "SUSE Bug 1095042", "url": "https://bugzilla.suse.com/1095042" }, { "category": "self", "summary": "SUSE Bug 1095147", "url": "https://bugzilla.suse.com/1095147" }, { "category": "self", "summary": "SUSE Bug 1096037", "url": "https://bugzilla.suse.com/1096037" }, { "category": "self", "summary": "SUSE Bug 1096140", "url": "https://bugzilla.suse.com/1096140" }, { "category": "self", "summary": "SUSE Bug 1096214", "url": "https://bugzilla.suse.com/1096214" }, { "category": "self", "summary": "SUSE Bug 1096242", "url": "https://bugzilla.suse.com/1096242" }, { "category": "self", "summary": "SUSE Bug 1096281", "url": "https://bugzilla.suse.com/1096281" }, { "category": "self", "summary": "SUSE Bug 1096751", "url": "https://bugzilla.suse.com/1096751" }, { "category": "self", "summary": "SUSE Bug 1096982", "url": "https://bugzilla.suse.com/1096982" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1097356", "url": "https://bugzilla.suse.com/1097356" }, { "category": "self", "summary": "SUSE Bug 1098009", "url": "https://bugzilla.suse.com/1098009" }, { "category": "self", "summary": "SUSE Bug 1098012", "url": "https://bugzilla.suse.com/1098012" }, { "category": "self", "summary": "SUSE Bug 919144", "url": "https://bugzilla.suse.com/919144" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 978907", "url": "https://bugzilla.suse.com/978907" }, { "category": "self", "summary": "SUSE Bug 993388", "url": "https://bugzilla.suse.com/993388" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18241 page", "url": "https://www.suse.com/security/cve/CVE-2017-18241/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18249 page", "url": "https://www.suse.com/security/cve/CVE-2017-18249/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1065 page", "url": "https://www.suse.com/security/cve/CVE-2018-1065/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1092 page", "url": "https://www.suse.com/security/cve/CVE-2018-1092/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1093 page", "url": "https://www.suse.com/security/cve/CVE-2018-1093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1094 page", "url": "https://www.suse.com/security/cve/CVE-2018-1094/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5848 page", "url": "https://www.suse.com/security/cve/CVE-2018-5848/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-06-26T11:39:16Z", "generator": { "date": "2018-06-26T11:39:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1816-1", "initial_release_date": "2018-06-26T11:39:16Z", "revision_history": [ { "date": "2018-06-26T11:39:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.4.138-3.14.1.noarch", "product": { "name": "kernel-devel-rt-4.4.138-3.14.1.noarch", "product_id": "kernel-devel-rt-4.4.138-3.14.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.4.138-3.14.1.noarch", "product": { "name": "kernel-source-rt-4.4.138-3.14.1.noarch", "product_id": "kernel-source-rt-4.4.138-3.14.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "product_id": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64", "product": { "name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64", "product_id": "dlm-kmp-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "product_id": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-rt-4.4.138-3.14.1.x86_64", "product_id": "kernel-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-rt-base-4.4.138-3.14.1.x86_64", "product_id": "kernel-rt-base-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-rt-devel-4.4.138-3.14.1.x86_64", "product_id": "kernel-rt-devel-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "product_id": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-syms-rt-4.4.138-3.14.1.x86_64", "product_id": "kernel-syms-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64", "product_id": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.4.138-3.14.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch" }, "product_reference": "kernel-devel-rt-4.4.138-3.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-rt-base-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-rt-devel-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.4.138-3.14.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch" }, "product_reference": "kernel-source-rt-4.4.138-3.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-syms-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-18241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18241" } ], "notes": [ { "category": "general", "text": "fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18241", "url": "https://www.suse.com/security/cve/CVE-2017-18241" }, { "category": "external", "summary": "SUSE Bug 1086400 for CVE-2017-18241", "url": "https://bugzilla.suse.com/1086400" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18249" } ], "notes": [ { "category": "general", "text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18249", "url": "https://www.suse.com/security/cve/CVE-2017-18249" }, { "category": "external", "summary": "SUSE Bug 1087036 for CVE-2017-18249", "url": "https://bugzilla.suse.com/1087036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2017-18249" }, { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-1065", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1065" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1065", "url": "https://www.suse.com/security/cve/CVE-2018-1065" }, { "category": "external", "summary": "SUSE Bug 1083650 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1083650" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1092" } ], "notes": [ { "category": "general", "text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1092", "url": "https://www.suse.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "SUSE Bug 1087012 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087012" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1093" } ], "notes": [ { "category": "general", "text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1093", "url": "https://www.suse.com/security/cve/CVE-2018-1093" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087095 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087095" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1094" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1094", "url": "https://www.suse.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "SUSE Bug 1087007 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087007" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1094" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5848" } ], "notes": [ { "category": "general", "text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5848", "url": "https://www.suse.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097356 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1097356" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1115339 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1115339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-5848" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-7492" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "important" } ], "title": "CVE-2018-8781" } ] }
suse-su-2018:0841-1
Vulnerability from csaf_suse
Published
2018-03-29 09:58
Modified
2018-03-29 09:58
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.
- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver, i40e/i40evf driver and the DPDK, additionally multiple vendor NIC firmware is affected (bnc#1077355).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated (bnc#1077922).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).
The following non-security bugs were fixed:
- Add proper NX hadnling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).
- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).
- alsa: aloop: Release cable upon open error path (bsc#1045538).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).
- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).
- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).
- btrfs: make the state of the transaction more readable (FATE#325056).
- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).
- btrfs: reset intwrite on transaction abort (FATE#325056).
- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).
- btrfs: stop waiting on current trans if we aborted (FATE#325056).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- delay: add poll_event_interruptible (bsc#1048585).
- dm flakey: add corrupt_bio_byte feature (bsc#1080372).
- dm flakey: add drop_writes (bsc#1080372).
- dm flakey: error READ bios during the down_interval (bsc#1080372).
- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).
- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).
- dm flakey: introduce 'error_writes' feature (bsc#1080372).
- dm flakey: support feature args (bsc#1080372).
- dm flakey: use dm_target_offset and support discards (bsc#1080372).
- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).
- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- ext3: add necessary check in case IO error happens (bnc#1069508).
- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- fork: clear thread stack upon allocation (bsc#1077560).
- kabi/severities ignore Cell-specific symbols
- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz
- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.
- kaiser: Fix trampoline stack loading issue on XEN PV
- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)
- kaiser: make sure not to touch stack after CR3 switch in compat syscall return
- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- mISDN: fix a loop count (bsc#1077191).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
- nfsd: do not share group_info among threads (bsc@1070623).
- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).
- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075088).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075088).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).
- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).
- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).
- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).
- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).
- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper (bsc#1068032, bsc#1075088).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).
- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075088).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).
- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).
- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).
- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075088).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- Update config files: enable CPU vulnerabilities reporting via sysfs
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
Patchnames
slertesp4-kernel-rt-20180209-13539
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver, i40e/i40evf driver and the DPDK, additionally multiple vendor NIC firmware is affected (bnc#1077355).\n- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated (bnc#1077922).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n\nThe following non-security bugs were fixed:\n\n- Add proper NX hadnling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).\n- alsa: aloop: Release cable upon open error path (bsc#1045538).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).\n- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).\n- btrfs: copy fsid to super_block s_uuid (bsc#1080774).\n- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).\n- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).\n- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).\n- btrfs: make the state of the transaction more readable (FATE#325056).\n- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).\n- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).\n- btrfs: reset intwrite on transaction abort (FATE#325056).\n- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).\n- btrfs: stop waiting on current trans if we aborted (FATE#325056).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: wait for tray to close (bsc#1048585).\n- delay: add poll_event_interruptible (bsc#1048585).\n- dm flakey: add corrupt_bio_byte feature (bsc#1080372).\n- dm flakey: add drop_writes (bsc#1080372).\n- dm flakey: error READ bios during the down_interval (bsc#1080372).\n- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).\n- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).\n- dm flakey: introduce \u0027error_writes\u0027 feature (bsc#1080372).\n- dm flakey: support feature args (bsc#1080372).\n- dm flakey: use dm_target_offset and support discards (bsc#1080372).\n- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).\n- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).\n- ext3: add necessary check in case IO error happens (bnc#1069508).\n- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).\n- fork: clear thread stack upon allocation (bsc#1077560).\n- kabi/severities ignore Cell-specific symbols\n- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz\n- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.\n- kaiser: Fix trampoline stack loading issue on XEN PV\n- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)\n- kaiser: make sure not to touch stack after CR3 switch in compat syscall return\n- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).\n- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).\n- mISDN: fix a loop count (bsc#1077191).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).\n- nfsd: do not share group_info among threads (bsc@1070623).\n- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).\n- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).\n- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075088).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075088).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).\n- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).\n- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).\n- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).\n- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).\n- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags \u0026 wrapper (bsc#1068032, bsc#1075088).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075088).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).\n- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).\n- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).\n- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).\n- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).\n- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075088).\n- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).\n- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).\n- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- Update config files: enable CPU vulnerabilities reporting via sysfs\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).\n- x86/kaiser: use trampoline stack for kernel entry.\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).\n- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-rt-20180209-13539", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0841-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0841-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180841-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0841-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1045538", "url": "https://bugzilla.suse.com/1045538" }, { "category": "self", "summary": "SUSE Bug 1048585", "url": "https://bugzilla.suse.com/1048585" }, { "category": "self", "summary": "SUSE Bug 1049128", "url": "https://bugzilla.suse.com/1049128" }, { "category": "self", "summary": "SUSE Bug 1050431", "url": "https://bugzilla.suse.com/1050431" }, { "category": "self", "summary": "SUSE Bug 1054305", "url": "https://bugzilla.suse.com/1054305" }, { "category": "self", "summary": "SUSE Bug 1059174", "url": "https://bugzilla.suse.com/1059174" }, { "category": "self", "summary": "SUSE Bug 1060279", "url": "https://bugzilla.suse.com/1060279" }, { "category": "self", "summary": "SUSE Bug 1060682", "url": "https://bugzilla.suse.com/1060682" }, { "category": "self", "summary": "SUSE Bug 1063544", "url": "https://bugzilla.suse.com/1063544" }, { "category": "self", "summary": "SUSE Bug 1064861", "url": "https://bugzilla.suse.com/1064861" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1068984", "url": "https://bugzilla.suse.com/1068984" }, { "category": "self", "summary": "SUSE Bug 1069508", "url": "https://bugzilla.suse.com/1069508" }, { "category": "self", "summary": "SUSE Bug 1070623", "url": "https://bugzilla.suse.com/1070623" }, { "category": "self", "summary": "SUSE Bug 1070781", "url": "https://bugzilla.suse.com/1070781" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1074488", "url": "https://bugzilla.suse.com/1074488" }, { "category": "self", "summary": "SUSE Bug 1074621", "url": "https://bugzilla.suse.com/1074621" }, { "category": "self", "summary": "SUSE Bug 1074880", "url": "https://bugzilla.suse.com/1074880" }, { "category": "self", "summary": "SUSE Bug 1075088", "url": "https://bugzilla.suse.com/1075088" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075410", "url": "https://bugzilla.suse.com/1075410" }, { "category": "self", "summary": "SUSE Bug 1075617", "url": "https://bugzilla.suse.com/1075617" }, { "category": "self", "summary": "SUSE Bug 1075621", "url": "https://bugzilla.suse.com/1075621" }, { "category": "self", "summary": "SUSE Bug 1075908", "url": "https://bugzilla.suse.com/1075908" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1076154", "url": "https://bugzilla.suse.com/1076154" }, { "category": "self", "summary": "SUSE Bug 1076278", "url": "https://bugzilla.suse.com/1076278" }, { "category": "self", "summary": "SUSE Bug 1076437", "url": "https://bugzilla.suse.com/1076437" }, { "category": "self", "summary": "SUSE Bug 1076849", "url": "https://bugzilla.suse.com/1076849" }, { "category": "self", "summary": "SUSE Bug 1077191", "url": "https://bugzilla.suse.com/1077191" }, { "category": "self", "summary": "SUSE Bug 1077355", "url": "https://bugzilla.suse.com/1077355" }, { "category": "self", "summary": "SUSE Bug 1077406", "url": "https://bugzilla.suse.com/1077406" }, { "category": "self", "summary": "SUSE Bug 1077487", "url": "https://bugzilla.suse.com/1077487" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1077922", "url": "https://bugzilla.suse.com/1077922" }, { "category": "self", "summary": "SUSE Bug 1078875", "url": "https://bugzilla.suse.com/1078875" }, { "category": "self", "summary": "SUSE Bug 1079917", "url": "https://bugzilla.suse.com/1079917" }, { "category": "self", "summary": "SUSE Bug 1080133", "url": "https://bugzilla.suse.com/1080133" }, { "category": "self", "summary": "SUSE Bug 1080359", "url": "https://bugzilla.suse.com/1080359" }, { "category": "self", "summary": "SUSE Bug 1080363", "url": "https://bugzilla.suse.com/1080363" }, { "category": "self", "summary": "SUSE Bug 1080372", "url": "https://bugzilla.suse.com/1080372" }, { "category": "self", "summary": "SUSE Bug 1080579", "url": "https://bugzilla.suse.com/1080579" }, { "category": "self", "summary": "SUSE Bug 1080685", "url": "https://bugzilla.suse.com/1080685" }, { "category": "self", "summary": "SUSE Bug 1080774", "url": "https://bugzilla.suse.com/1080774" }, { "category": "self", "summary": "SUSE Bug 1081500", "url": "https://bugzilla.suse.com/1081500" }, { "category": "self", "summary": "SUSE Bug 936530", "url": "https://bugzilla.suse.com/936530" }, { "category": "self", "summary": "SUSE Bug 962257", "url": "https://bugzilla.suse.com/962257" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1142857 page", "url": "https://www.suse.com/security/cve/CVE-2015-1142857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13215 page", "url": "https://www.suse.com/security/cve/CVE-2017-13215/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18017 page", "url": "https://www.suse.com/security/cve/CVE-2017-18017/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18079 page", "url": "https://www.suse.com/security/cve/CVE-2017-18079/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-03-29T09:58:40Z", "generator": { "date": "2018-03-29T09:58:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0841-1", "initial_release_date": "2018-03-29T09:58:40Z", "revision_history": [ { "date": "2018-03-29T09:58:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-69.21.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-69.21.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-69.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-69.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1142857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1142857" } ], "notes": [ { "category": "general", "text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1142857", "url": "https://www.suse.com/security/cve/CVE-2015-1142857" }, { "category": "external", "summary": "SUSE Bug 1077355 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1077355" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1105108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "moderate" } ], "title": "CVE-2015-1142857" }, { "cve": "CVE-2017-13215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13215" } ], "notes": [ { "category": "general", "text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13215", "url": "https://www.suse.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "SUSE Bug 1075908 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1075908" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "moderate" } ], "title": "CVE-2017-13215" }, { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-18017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18017" } ], "notes": [ { "category": "general", "text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18017", "url": "https://www.suse.com/security/cve/CVE-2017-18017" }, { "category": "external", "summary": "SUSE Bug 1074488 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1074488" }, { "category": "external", "summary": "SUSE Bug 1080255 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1080255" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2017-18017", "url": "https://bugzilla.suse.com/971126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "important" } ], "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18079" } ], "notes": [ { "category": "general", "text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18079", "url": "https://www.suse.com/security/cve/CVE-2017-18079" }, { "category": "external", "summary": "SUSE Bug 1077922 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1077922" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "low" } ], "title": "CVE-2017-18079" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.21.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T09:58:40Z", "details": "low" } ], "title": "CVE-2018-5333" } ] }
suse-su-2018:0525-1
Vulnerability from csaf_suse
Published
2018-02-22 17:05
Modified
2018-02-22 17:05
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized disclosure
of information to an attacker with local user access via a side-channel
analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building
the Linux Kernel with return trampolines aka 'retpolines'.
- CVE-2017-18079: drivers/input/serio/i8042.c allowed attackers to cause a
denial of service (NULL pointer dereference and system crash) or possibly have
unspecified other impact because the port->exists value can change after it
is validated (bnc#1077922).
- CVE-2015-1142857: Prevent guests from sending ethernet flow control pause
frames via the PF (bnc#1077355).
- CVE-2017-17741: KVM allowed attackers to obtain potentially sensitive
information from kernel memory, aka a write_mmio stack-based out-of-bounds read
(bnc#1073311).
- CVE-2017-13215: Prevent elevation of privilege (bnc#1075908).
- CVE-2018-1000004: Prevent race condition in the sound system, this could have
lead a deadlock and denial of service condition (bnc#1076017).
- CVE-2017-17806: The HMAC implementation did not validate that the underlying
cryptographic hash algorithm is unkeyed, allowing a local attacker able to use
the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3
hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by
executing a crafted sequence of system calls that encounter a missing SHA-3
initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm did not correctly handle
zero-length inputs, allowing a local attacker able to use the AF_ALG-based
skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of
service (uninitialized-memory free and kernel crash) or have unspecified other
impact by executing a crafted sequence of system calls that use the
blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c)
and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were
vulnerable (bnc#1073792).
The following non-security bugs were fixed:
- NFS: only invalidate dentrys that are clearly invalid (bsc#1047118).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: Abstract out stuff needed for sorting (bsc#1076110).
- bcache: Add a cond_resched() call to gc (bsc#1076110).
- bcache: Add a real GC_MARK_RECLAIMABLE (bsc#1076110).
- bcache: Add bch_bkey_equal_header() (bsc#1076110).
- bcache: Add bch_btree_keys_u64s_remaining() (bsc#1076110).
- bcache: Add bch_keylist_init_single() (bsc#1047626).
- bcache: Add btree_insert_node() (bnc#951638).
- bcache: Add btree_map() functions (bsc#1047626).
- bcache: Add btree_node_write_sync() (bsc#1076110).
- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).
- bcache: Add make_btree_freeing_key() (bsc#1076110).
- bcache: Add on error panic/unregister setting (bsc#1047626).
- bcache: Add struct bset_sort_state (bsc#1076110).
- bcache: Add struct btree_keys (bsc#1076110).
- bcache: Allocate bounce buffers with GFP_NOWAIT (bsc#1076110).
- bcache: Avoid deadlocking in garbage collection (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: Better alloc tracepoints (bsc#1076110).
- bcache: Better full stripe scanning (bsc#1076110).
- bcache: Bkey indexing renaming (bsc#1076110).
- bcache: Break up struct search (bsc#1076110).
- bcache: Btree verify code improvements (bsc#1076110).
- bcache: Bypass torture test (bsc#1076110).
- bcache: Change refill_dirty() to always scan entire disk if necessary (bsc#1076110).
- bcache: Clean up cache_lookup_fn (bsc#1076110).
- bcache: Clean up keylist code (bnc#951638).
- bcache: Convert bch_btree_insert() to bch_btree_map_leaf_nodes() (bsc#1076110).
- bcache: Convert bch_btree_read_async() to bch_btree_map_keys() (bsc#1076110).
- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).
- bcache: Convert btree_iter to struct btree_keys (bsc#1076110).
- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert debug code to btree_keys (bsc#1076110).
- bcache: Convert gc to a kthread (bsc#1047626).
- bcache: Convert sorting to btree_keys (bsc#1076110).
- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert writeback to a kthread (bsc#1076110).
- bcache: Correct return value for sysfs attach errors (bsc#1076110).
- bcache: Debug code improvements (bsc#1076110).
- bcache: Delete some slower inline asm (bsc#1047626).
- bcache: Do bkey_put() in btree_split() error path (bsc#1076110).
- bcache: Do not bother with bucket refcount for btree node allocations (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).
- bcache: Do not return -EINTR when insert finished (bsc#1076110).
- bcache: Do not touch bucket gen for dirty ptrs (bsc#1076110).
- bcache: Do not use op->insert_collision (bsc#1076110).
- bcache: Drop some closure stuff (bsc#1076110).
- bcache: Drop unneeded blk_sync_queue() calls (bsc#1047626).
- bcache: Explicitly track btree node's parent (bnc#951638).
- bcache: Fix a bug recovering from unclean shutdown (bsc#1047626).
- bcache: Fix a bug when detaching (bsc#951638).
- bcache: Fix a journal replay bug (bsc#1076110).
- bcache: Fix a journalling performance bug (bnc#893777).
- bcache: Fix a journalling reclaim after recovery bug (bsc#1047626).
- bcache: Fix a lockdep splat (bnc#893777).
- bcache: Fix a lockdep splat in an error path (bnc#951638).
- bcache: Fix a null ptr deref in journal replay (bsc#1047626).
- bcache: Fix a race when freeing btree nodes (bsc#1076110).
- bcache: Fix a shutdown bug (bsc#951638).
- bcache: Fix an infinite loop in journal replay (bsc#1047626).
- bcache: Fix another bug recovering from unclean shutdown (bsc#1076110).
- bcache: Fix another compiler warning on m68k (bsc#1076110).
- bcache: Fix auxiliary search trees for key size greater than cacheline size (bsc#1076110).
- bcache: Fix bch_ptr_bad() (bsc#1047626).
- bcache: Fix building error on MIPS (bsc#1076110).
- bcache: Fix dirty_data accounting (bsc#1076110).
- bcache: Fix discard granularity (bsc#1047626).
- bcache: Fix flash_dev_cache_miss() for real this time (bsc#1076110).
- bcache: Fix for can_attach_cache() (bsc#1047626).
- bcache: Fix heap_peek() macro (bsc#1047626).
- bcache: Fix leak of bdev reference (bsc#1076110).
- bcache: Fix more early shutdown bugs (bsc#951638).
- bcache: Fix moving_gc deadlocking with a foreground write (bsc#1076110).
- bcache: Fix moving_pred() (bsc#1047626).
- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- bcache: Fix to remove the rcu_sched stalls (bsc#1047626).
- bcache: Have btree_split() insert into parent directly (bsc#1076110).
- bcache: Improve bucket_prio() calculation (bsc#1047626).
- bcache: Improve priority_stats (bsc#1047626).
- bcache: Incremental gc (bsc#1076110).
- bcache: Insert multiple keys at a time (bnc#951638).
- bcache: Kill bch_next_recurse_key() (bsc#1076110).
- bcache: Kill btree_io_wq (bsc#1076110).
- bcache: Kill bucket->gc_gen (bsc#1076110).
- bcache: Kill dead cgroup code (bsc#1076110).
- bcache: Kill op->cl (bsc#1076110).
- bcache: Kill op->replace (bsc#1076110).
- bcache: Kill sequential_merge option (bsc#1076110).
- bcache: Kill unaligned bvec hack (bsc#1076110).
- bcache: Kill unused freelist (bsc#1076110).
- bcache: Make bch_keylist_realloc() take u64s, not nptrs (bsc#1076110).
- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1076110).
- bcache: Minor btree cache fix (bsc#1047626).
- bcache: Minor fixes from kbuild robot (bsc#1076110).
- bcache: Move insert_fixup() to btree_keys_ops (bsc#1076110).
- bcache: Move keylist out of btree_op (bsc#1047626).
- bcache: Move sector allocator to alloc.c (bsc#1076110).
- bcache: Move some stuff to btree.c (bsc#1076110).
- bcache: Move spinlock into struct time_stats (bsc#1076110).
- bcache: New writeback PD controller (bsc#1047626).
- bcache: PRECEDING_KEY() (bsc#1047626).
- bcache: Performance fix for when journal entry is full (bsc#1047626).
- bcache: Prune struct btree_op (bsc#1076110).
- bcache: Pull on disk data structures out into a separate header (bsc#1076110).
- bcache: RESERVE_PRIO is too small by one when prio_buckets() is a power of two (bsc#1076110).
- bcache: Really show state of work pending bit (bsc#1076110).
- bcache: Refactor bset_tree sysfs stats (bsc#1076110).
- bcache: Refactor journalling flow control (bnc#951638).
- bcache: Refactor read request code a bit (bsc#1076110).
- bcache: Refactor request_write() (bnc#951638).
- bcache: Remove deprecated create_workqueue (bsc#1076110).
- bcache: Remove redundant block_size assignment (bsc#1047626).
- bcache: Remove redundant parameter for cache_alloc() (bsc#1047626).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: Remove unnecessary check in should_split() (bsc#1076110).
- bcache: Remove/fix some header dependencies (bsc#1047626).
- bcache: Rename/shuffle various code around (bsc#1076110).
- bcache: Rework allocator reserves (bsc#1076110).
- bcache: Rework btree cache reserve handling (bsc#1076110).
- bcache: Split out sort_extent_cmp() (bsc#1076110).
- bcache: Stripe size isn't necessarily a power of two (bnc#893949).
- bcache: Trivial error handling fix (bsc#1047626).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: Use a mempool for mergesort temporary space (bsc#1076110).
- bcache: Use blkdev_issue_discard() (bnc#951638).
- bcache: Use ida for bcache block dev minor (bsc#1047626).
- bcache: Use uninterruptible sleep in writeback (bsc#1076110).
- bcache: Zero less memory (bsc#1076110).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: add mutex lock for bch_is_open (bnc#902893).
- bcache: allows use of register in udev to avoid 'device_busy' error (bsc#1047626).
- bcache: bcache_write tracepoint was crashing (bsc#1076110).
- bcache: bch_(btree|extent)_ptr_invalid() (bsc#1076110).
- bcache: bch_allocator_thread() is not freezable (bsc#1047626).
- bcache: bch_gc_thread() is not freezable (bsc#1047626).
- bcache: bch_writeback_thread() is not freezable (bsc#1076110).
- bcache: btree locking rework (bsc#1076110).
- bcache: bugfix - gc thread now gets woken when cache is full (bsc#1047626).
- bcache: bugfix - moving_gc now moves only correct buckets (bsc#1047626).
- bcache: bugfix for race between moving_gc and bucket_invalidate (bsc#1076110).
- bcache: check ca->alloc_thread initialized before wake up it (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: cleaned up error handling around register_cache() (bsc#1047626).
- bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing device (bsc#1047626).
- bcache: correct cache_dirty_target in __update_writeback_rate() (bsc#1076110).
- bcache: defensively handle format strings (bsc#1047626).
- bcache: do not embed 'return' statements in closure macros (bsc#1076110).
- bcache: do not subtract sectors_to_gc for bypassed IO (bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bsc#1076110).
- bcache: fix BUG_ON due to integer overflow with GC_SECTORS_USED (bsc#1047626).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: fix a livelock when we cause a huge number of cache misses (bsc#1047626).
- bcache: fix bch_hprint crash and improve output (bsc#1076110).
- bcache: fix crash in bcache_btree_node_alloc_fail tracepoint (bsc#1047626).
- bcache: fix crash on shutdown in passthrough mode (bsc#1076110).
- bcache: fix for gc and write-back race (bsc#1076110).
- bcache: fix for gc and writeback race (bsc#1047626).
- bcache: fix for gc crashing when no sectors are used (bsc#1047626).
- bcache: fix race of writeback thread starting before complete initialization (bsc#1076110).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix sparse non static symbol warning (bsc#1076110).
- bcache: fix typo in bch_bkey_equal_header (bsc#1076110).
- bcache: fix uninterruptible sleep in writeback thread (bsc#1076110).
- bcache: fix use-after-free in btree_gc_coalesce() (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bsc#1076110).
- bcache: gc does not work when triggering by manual command (bsc#1076110).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: initialize dirty stripes in flash_dev_run() (bsc#1076110).
- bcache: kill closure locking code (bsc#1076110).
- bcache: kill closure locking usage (bnc#951638).
- bcache: kill index() (bsc#1047626).
- bcache: kthread do not set writeback task to INTERUPTIBLE (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean (bsc#1076110).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).
- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).
- bcache: prevent crash on changing writeback_running (bsc#1076110).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bsc#1076110).
- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1047626).
- bcache: remove nested function usage (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache: stop moving_gc marking buckets that can't be moved (bsc#1047626).
- bcache: try to set b->parent properly (bsc#1076110).
- bcache: update bch_bkey_try_merge (bsc#1076110).
- bcache: update bio->bi_opf bypass/writeback REQ_ flag hints (bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: update document info (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use kvfree() in various places (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).
- bcache: wait for buckets when allocating new btree root (bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- block: bump BLK_DEF_MAX_SECTORS to 2560 (bsc#1073246)
- fork: clear thread stack upon allocation (bsc#1077560).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).
- md: more open-coded offset_in_page() (bsc#1076110).
- nfsd: do not share group_info among threads (bsc@1070623).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1077182).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1077182).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1077182).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1077182).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1077182).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1077182).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1077182).
- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032, bsc#1077182).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags > wrapper (bsc#1068032, bsc#1077182).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1077182).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1077182).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1077182).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1077182).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1077182).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1077182).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075411).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
Patchnames
SUSE-OpenStack-Cloud-6-2018-348,SUSE-SLE-Module-Public-Cloud-12-2018-348,SUSE-SLE-SAP-12-SP1-2018-348,SUSE-SLE-SERVER-12-SP1-2018-348
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building\n the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2017-18079: drivers/input/serio/i8042.c allowed attackers to cause a\n denial of service (NULL pointer dereference and system crash) or possibly have\n unspecified other impact because the port-\u003eexists value can change after it\n is validated (bnc#1077922).\n- CVE-2015-1142857: Prevent guests from sending ethernet flow control pause\n frames via the PF (bnc#1077355).\n- CVE-2017-17741: KVM allowed attackers to obtain potentially sensitive\n information from kernel memory, aka a write_mmio stack-based out-of-bounds read\n (bnc#1073311).\n- CVE-2017-13215: Prevent elevation of privilege (bnc#1075908).\n- CVE-2018-1000004: Prevent race condition in the sound system, this could have\n lead a deadlock and denial of service condition (bnc#1076017).\n- CVE-2017-17806: The HMAC implementation did not validate that the underlying\n cryptographic hash algorithm is unkeyed, allowing a local attacker able to use\n the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3\n hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by\n executing a crafted sequence of system calls that encounter a missing SHA-3\n initialization (bnc#1073874).\n- CVE-2017-17805: The Salsa20 encryption algorithm did not correctly handle\n zero-length inputs, allowing a local attacker able to use the AF_ALG-based\n skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of\n service (uninitialized-memory free and kernel crash) or have unspecified other\n impact by executing a crafted sequence of system calls that use the\n blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c)\n and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were\n vulnerable (bnc#1073792).\n\nThe following non-security bugs were fixed:\n\n- NFS: only invalidate dentrys that are clearly invalid (bsc#1047118).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: Abstract out stuff needed for sorting (bsc#1076110).\n- bcache: Add a cond_resched() call to gc (bsc#1076110).\n- bcache: Add a real GC_MARK_RECLAIMABLE (bsc#1076110).\n- bcache: Add bch_bkey_equal_header() (bsc#1076110).\n- bcache: Add bch_btree_keys_u64s_remaining() (bsc#1076110).\n- bcache: Add bch_keylist_init_single() (bsc#1047626).\n- bcache: Add btree_insert_node() (bnc#951638).\n- bcache: Add btree_map() functions (bsc#1047626).\n- bcache: Add btree_node_write_sync() (bsc#1076110).\n- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).\n- bcache: Add make_btree_freeing_key() (bsc#1076110).\n- bcache: Add on error panic/unregister setting (bsc#1047626).\n- bcache: Add struct bset_sort_state (bsc#1076110).\n- bcache: Add struct btree_keys (bsc#1076110).\n- bcache: Allocate bounce buffers with GFP_NOWAIT (bsc#1076110).\n- bcache: Avoid deadlocking in garbage collection (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: Better alloc tracepoints (bsc#1076110).\n- bcache: Better full stripe scanning (bsc#1076110).\n- bcache: Bkey indexing renaming (bsc#1076110).\n- bcache: Break up struct search (bsc#1076110).\n- bcache: Btree verify code improvements (bsc#1076110).\n- bcache: Bypass torture test (bsc#1076110).\n- bcache: Change refill_dirty() to always scan entire disk if necessary (bsc#1076110).\n- bcache: Clean up cache_lookup_fn (bsc#1076110).\n- bcache: Clean up keylist code (bnc#951638).\n- bcache: Convert bch_btree_insert() to bch_btree_map_leaf_nodes() (bsc#1076110).\n- bcache: Convert bch_btree_read_async() to bch_btree_map_keys() (bsc#1076110).\n- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).\n- bcache: Convert btree_iter to struct btree_keys (bsc#1076110).\n- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert debug code to btree_keys (bsc#1076110).\n- bcache: Convert gc to a kthread (bsc#1047626).\n- bcache: Convert sorting to btree_keys (bsc#1076110).\n- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert writeback to a kthread (bsc#1076110).\n- bcache: Correct return value for sysfs attach errors (bsc#1076110).\n- bcache: Debug code improvements (bsc#1076110).\n- bcache: Delete some slower inline asm (bsc#1047626).\n- bcache: Do bkey_put() in btree_split() error path (bsc#1076110).\n- bcache: Do not bother with bucket refcount for btree node allocations (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: Do not return -EINTR when insert finished (bsc#1076110).\n- bcache: Do not touch bucket gen for dirty ptrs (bsc#1076110).\n- bcache: Do not use op-\u003einsert_collision (bsc#1076110).\n- bcache: Drop some closure stuff (bsc#1076110).\n- bcache: Drop unneeded blk_sync_queue() calls (bsc#1047626).\n- bcache: Explicitly track btree node\u0027s parent (bnc#951638).\n- bcache: Fix a bug recovering from unclean shutdown (bsc#1047626).\n- bcache: Fix a bug when detaching (bsc#951638).\n- bcache: Fix a journal replay bug (bsc#1076110).\n- bcache: Fix a journalling performance bug (bnc#893777).\n- bcache: Fix a journalling reclaim after recovery bug (bsc#1047626).\n- bcache: Fix a lockdep splat (bnc#893777).\n- bcache: Fix a lockdep splat in an error path (bnc#951638).\n- bcache: Fix a null ptr deref in journal replay (bsc#1047626).\n- bcache: Fix a race when freeing btree nodes (bsc#1076110).\n- bcache: Fix a shutdown bug (bsc#951638).\n- bcache: Fix an infinite loop in journal replay (bsc#1047626).\n- bcache: Fix another bug recovering from unclean shutdown (bsc#1076110).\n- bcache: Fix another compiler warning on m68k (bsc#1076110).\n- bcache: Fix auxiliary search trees for key size greater than cacheline size (bsc#1076110).\n- bcache: Fix bch_ptr_bad() (bsc#1047626).\n- bcache: Fix building error on MIPS (bsc#1076110).\n- bcache: Fix dirty_data accounting (bsc#1076110).\n- bcache: Fix discard granularity (bsc#1047626).\n- bcache: Fix flash_dev_cache_miss() for real this time (bsc#1076110).\n- bcache: Fix for can_attach_cache() (bsc#1047626).\n- bcache: Fix heap_peek() macro (bsc#1047626).\n- bcache: Fix leak of bdev reference (bsc#1076110).\n- bcache: Fix more early shutdown bugs (bsc#951638).\n- bcache: Fix moving_gc deadlocking with a foreground write (bsc#1076110).\n- bcache: Fix moving_pred() (bsc#1047626).\n- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- bcache: Fix to remove the rcu_sched stalls (bsc#1047626).\n- bcache: Have btree_split() insert into parent directly (bsc#1076110).\n- bcache: Improve bucket_prio() calculation (bsc#1047626).\n- bcache: Improve priority_stats (bsc#1047626).\n- bcache: Incremental gc (bsc#1076110).\n- bcache: Insert multiple keys at a time (bnc#951638).\n- bcache: Kill bch_next_recurse_key() (bsc#1076110).\n- bcache: Kill btree_io_wq (bsc#1076110).\n- bcache: Kill bucket-\u003egc_gen (bsc#1076110).\n- bcache: Kill dead cgroup code (bsc#1076110).\n- bcache: Kill op-\u003ecl (bsc#1076110).\n- bcache: Kill op-\u003ereplace (bsc#1076110).\n- bcache: Kill sequential_merge option (bsc#1076110).\n- bcache: Kill unaligned bvec hack (bsc#1076110).\n- bcache: Kill unused freelist (bsc#1076110).\n- bcache: Make bch_keylist_realloc() take u64s, not nptrs (bsc#1076110).\n- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1076110).\n- bcache: Minor btree cache fix (bsc#1047626).\n- bcache: Minor fixes from kbuild robot (bsc#1076110).\n- bcache: Move insert_fixup() to btree_keys_ops (bsc#1076110).\n- bcache: Move keylist out of btree_op (bsc#1047626).\n- bcache: Move sector allocator to alloc.c (bsc#1076110).\n- bcache: Move some stuff to btree.c (bsc#1076110).\n- bcache: Move spinlock into struct time_stats (bsc#1076110).\n- bcache: New writeback PD controller (bsc#1047626).\n- bcache: PRECEDING_KEY() (bsc#1047626).\n- bcache: Performance fix for when journal entry is full (bsc#1047626).\n- bcache: Prune struct btree_op (bsc#1076110).\n- bcache: Pull on disk data structures out into a separate header (bsc#1076110).\n- bcache: RESERVE_PRIO is too small by one when prio_buckets() is a power of two (bsc#1076110).\n- bcache: Really show state of work pending bit (bsc#1076110).\n- bcache: Refactor bset_tree sysfs stats (bsc#1076110).\n- bcache: Refactor journalling flow control (bnc#951638).\n- bcache: Refactor read request code a bit (bsc#1076110).\n- bcache: Refactor request_write() (bnc#951638).\n- bcache: Remove deprecated create_workqueue (bsc#1076110).\n- bcache: Remove redundant block_size assignment (bsc#1047626).\n- bcache: Remove redundant parameter for cache_alloc() (bsc#1047626).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: Remove unnecessary check in should_split() (bsc#1076110).\n- bcache: Remove/fix some header dependencies (bsc#1047626).\n- bcache: Rename/shuffle various code around (bsc#1076110).\n- bcache: Rework allocator reserves (bsc#1076110).\n- bcache: Rework btree cache reserve handling (bsc#1076110).\n- bcache: Split out sort_extent_cmp() (bsc#1076110).\n- bcache: Stripe size isn\u0027t necessarily a power of two (bnc#893949).\n- bcache: Trivial error handling fix (bsc#1047626).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: Use a mempool for mergesort temporary space (bsc#1076110).\n- bcache: Use blkdev_issue_discard() (bnc#951638).\n- bcache: Use ida for bcache block dev minor (bsc#1047626).\n- bcache: Use uninterruptible sleep in writeback (bsc#1076110).\n- bcache: Zero less memory (bsc#1076110).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: add mutex lock for bch_is_open (bnc#902893).\n- bcache: allows use of register in udev to avoid \u0027device_busy\u0027 error (bsc#1047626).\n- bcache: bcache_write tracepoint was crashing (bsc#1076110).\n- bcache: bch_(btree|extent)_ptr_invalid() (bsc#1076110).\n- bcache: bch_allocator_thread() is not freezable (bsc#1047626).\n- bcache: bch_gc_thread() is not freezable (bsc#1047626).\n- bcache: bch_writeback_thread() is not freezable (bsc#1076110).\n- bcache: btree locking rework (bsc#1076110).\n- bcache: bugfix - gc thread now gets woken when cache is full (bsc#1047626).\n- bcache: bugfix - moving_gc now moves only correct buckets (bsc#1047626).\n- bcache: bugfix for race between moving_gc and bucket_invalidate (bsc#1076110).\n- bcache: check ca-\u003ealloc_thread initialized before wake up it (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: cleaned up error handling around register_cache() (bsc#1047626).\n- bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing device (bsc#1047626).\n- bcache: correct cache_dirty_target in __update_writeback_rate() (bsc#1076110).\n- bcache: defensively handle format strings (bsc#1047626).\n- bcache: do not embed \u0027return\u0027 statements in closure macros (bsc#1076110).\n- bcache: do not subtract sectors_to_gc for bypassed IO (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bsc#1076110).\n- bcache: fix BUG_ON due to integer overflow with GC_SECTORS_USED (bsc#1047626).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: fix a livelock when we cause a huge number of cache misses (bsc#1047626).\n- bcache: fix bch_hprint crash and improve output (bsc#1076110).\n- bcache: fix crash in bcache_btree_node_alloc_fail tracepoint (bsc#1047626).\n- bcache: fix crash on shutdown in passthrough mode (bsc#1076110).\n- bcache: fix for gc and write-back race (bsc#1076110).\n- bcache: fix for gc and writeback race (bsc#1047626).\n- bcache: fix for gc crashing when no sectors are used (bsc#1047626).\n- bcache: fix race of writeback thread starting before complete initialization (bsc#1076110).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix sparse non static symbol warning (bsc#1076110).\n- bcache: fix typo in bch_bkey_equal_header (bsc#1076110).\n- bcache: fix uninterruptible sleep in writeback thread (bsc#1076110).\n- bcache: fix use-after-free in btree_gc_coalesce() (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bsc#1076110).\n- bcache: gc does not work when triggering by manual command (bsc#1076110).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: initialize dirty stripes in flash_dev_run() (bsc#1076110).\n- bcache: kill closure locking code (bsc#1076110).\n- bcache: kill closure locking usage (bnc#951638).\n- bcache: kill index() (bsc#1047626).\n- bcache: kthread do not set writeback task to INTERUPTIBLE (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bsc#1076110).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).\n- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).\n- bcache: prevent crash on changing writeback_running (bsc#1076110).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bsc#1076110).\n- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1047626).\n- bcache: remove nested function usage (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache: stop moving_gc marking buckets that can\u0027t be moved (bsc#1047626).\n- bcache: try to set b-\u003eparent properly (bsc#1076110).\n- bcache: update bch_bkey_try_merge (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: update document info (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use kvfree() in various places (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: wait for buckets when allocating new btree root (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- block: bump BLK_DEF_MAX_SECTORS to 2560 (bsc#1073246)\n- fork: clear thread stack upon allocation (bsc#1077560). \n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).\n- md: more open-coded offset_in_page() (bsc#1076110).\n- nfsd: do not share group_info among threads (bsc@1070623).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1077182).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1077182).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1077182).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1077182).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1077182).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1077182).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1077182).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1077182).\n- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032, bsc#1077182).\n- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags \u003e wrapper (bsc#1068032, bsc#1077182).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1077182).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1077182).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1077182).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1077182).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1077182).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1077182).\n- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075411).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-6-2018-348,SUSE-SLE-Module-Public-Cloud-12-2018-348,SUSE-SLE-SAP-12-SP1-2018-348,SUSE-SLE-SERVER-12-SP1-2018-348", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0525-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0525-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180525-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0525-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1047118", "url": "https://bugzilla.suse.com/1047118" }, { "category": "self", "summary": "SUSE Bug 1047626", "url": "https://bugzilla.suse.com/1047626" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1070623", "url": "https://bugzilla.suse.com/1070623" }, { "category": "self", "summary": "SUSE Bug 1073246", "url": "https://bugzilla.suse.com/1073246" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1073792", "url": "https://bugzilla.suse.com/1073792" }, { "category": "self", "summary": "SUSE Bug 1073874", "url": "https://bugzilla.suse.com/1073874" }, { "category": "self", "summary": "SUSE Bug 1074709", "url": "https://bugzilla.suse.com/1074709" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075411", "url": "https://bugzilla.suse.com/1075411" }, { "category": "self", "summary": "SUSE Bug 1075908", "url": "https://bugzilla.suse.com/1075908" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1076154", "url": "https://bugzilla.suse.com/1076154" }, { "category": "self", "summary": "SUSE Bug 1076278", "url": "https://bugzilla.suse.com/1076278" }, { "category": "self", "summary": "SUSE Bug 1077182", "url": "https://bugzilla.suse.com/1077182" }, { "category": "self", "summary": "SUSE Bug 1077355", "url": "https://bugzilla.suse.com/1077355" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1077922", "url": "https://bugzilla.suse.com/1077922" }, { "category": "self", "summary": "SUSE Bug 1081317", "url": "https://bugzilla.suse.com/1081317" }, { "category": "self", "summary": "SUSE Bug 893777", "url": "https://bugzilla.suse.com/893777" }, { "category": "self", "summary": "SUSE Bug 893949", "url": "https://bugzilla.suse.com/893949" }, { "category": "self", "summary": "SUSE Bug 902893", "url": "https://bugzilla.suse.com/902893" }, { "category": "self", "summary": "SUSE Bug 951638", "url": "https://bugzilla.suse.com/951638" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1142857 page", "url": "https://www.suse.com/security/cve/CVE-2015-1142857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13215 page", "url": "https://www.suse.com/security/cve/CVE-2017-13215/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17805 page", "url": "https://www.suse.com/security/cve/CVE-2017-17805/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17806 page", "url": "https://www.suse.com/security/cve/CVE-2017-17806/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18079 page", "url": "https://www.suse.com/security/cve/CVE-2017-18079/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-02-22T17:05:19Z", "generator": { "date": "2018-02-22T17:05:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0525-1", "initial_release_date": "2018-02-22T17:05:19Z", "revision_history": [ { "date": "2018-02-22T17:05:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.82.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.82.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.82.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.82.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.82.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.82.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.82.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.82.1.noarch", "product_id": "kernel-source-3.12.74-60.64.82.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.82.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.82.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.82.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.82.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.82.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.82.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.82.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.82.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.82.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.82.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.82.1.s390x", "product_id": "kernel-default-3.12.74-60.64.82.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.82.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.82.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.82.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.82.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.82.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.82.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.82.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.82.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.82.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.82.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.82.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.82.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 6", "product": { "name": "SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.82.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.82.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.82.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.82.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.82.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.82.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.82.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.82.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.82.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.82.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.82.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.82.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.82.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.82.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.82.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.82.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1142857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1142857" } ], "notes": [ { "category": "general", "text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1142857", "url": "https://www.suse.com/security/cve/CVE-2015-1142857" }, { "category": "external", "summary": "SUSE Bug 1077355 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1077355" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1105108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-22T17:05:19Z", "details": "moderate" } ], "title": "CVE-2015-1142857" }, { "cve": "CVE-2017-13215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13215" } ], "notes": [ { "category": "general", "text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13215", "url": "https://www.suse.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "SUSE Bug 1075908 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1075908" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-22T17:05:19Z", "details": "moderate" } ], "title": "CVE-2017-13215" }, { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-22T17:05:19Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-17805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17805" } ], "notes": [ { "category": "general", "text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17805", "url": "https://www.suse.com/security/cve/CVE-2017-17805" }, { "category": "external", "summary": "SUSE Bug 1073792 for CVE-2017-17805", "url": "https://bugzilla.suse.com/1073792" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-17805", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17805", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-22T17:05:19Z", "details": "important" } ], "title": "CVE-2017-17805" }, { "cve": "CVE-2017-17806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17806" } ], "notes": [ { "category": "general", "text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17806", "url": "https://www.suse.com/security/cve/CVE-2017-17806" }, { "category": "external", "summary": "SUSE Bug 1073874 for CVE-2017-17806", "url": "https://bugzilla.suse.com/1073874" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-17806", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17806", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-22T17:05:19Z", "details": "low" } ], "title": "CVE-2017-17806" }, { "cve": "CVE-2017-18079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18079" } ], "notes": [ { "category": "general", "text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18079", "url": "https://www.suse.com/security/cve/CVE-2017-18079" }, { "category": "external", "summary": "SUSE Bug 1077922 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1077922" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-22T17:05:19Z", "details": "low" } ], "title": "CVE-2017-18079" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-22T17:05:19Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.82.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.82.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-default-1-2.9.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_82-xen-1-2.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-22T17:05:19Z", "details": "moderate" } ], "title": "CVE-2018-1000004" } ] }
suse-su-2018:0555-1
Vulnerability from csaf_suse
Published
2018-02-27 16:16
Modified
2018-02-27 16:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized disclosure
of information to an attacker with local user access via a side-channel
analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building
the Linux Kernel with return trampolines aka 'retpolines'.
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
did not validate a value that is used during DMA page allocation, leading
to a heap-based out-of-bounds write (related to the rds_rdma_extra_size
function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
net/rds/rdma.c mishandled cases where page pinning fails or an invalid
address is supplied, leading to an rds_atomic_free_op NULL pointer
dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in
net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
to cause a denial of service (use-after-free and memory corruption)
or possibly have unspecified other impact by leveraging the presence of
xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed
attackers to cause a denial of service (NULL pointer dereference and
system crash) or possibly have unspecified other impact because the
port->exists value can change after it is validated (bnc#1077922).
- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF's
assigned to guests to send ethernet flow control pause frames via the
PF. (bnc#1077355).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed
attackers to obtain potentially sensitive information from kernel
memory, aka a write_mmio stack-based out-of-bounds read, related to
arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream
kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability
existed in the sound system, this can lead to a deadlock and denial of
service condition (bnc#1076017).
The following non-security bugs were fixed:
- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).
- alsa: aloop: Release cable upon open error path (bsc#1045538).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).
- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).
- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).
- btrfs: make the state of the transaction more readable (FATE#325056).
- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).
- btrfs: reset intwrite on transaction abort (FATE#325056).
- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).
- btrfs: stop waiting on current trans if we aborted (FATE#325056).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- delay: add poll_event_interruptible (bsc#1048585).
- dm flakey: add corrupt_bio_byte feature (bsc#1080372).
- dm flakey: add drop_writes (bsc#1080372).
- dm flakey: error READ bios during the down_interval (bsc#1080372).
- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).
- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).
- dm flakey: introduce 'error_writes' feature (bsc#1080372).
- dm flakey: support feature args (bsc#1080372).
- dm flakey: use dm_target_offset and support discards (bsc#1080372).
- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).
- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- ext3: add necessary check in case IO error happens (bnc#1069508).
- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Add proper NX handling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).
- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz
- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.
- kaiser: Fix trampoline stack loading issue on XEN PV
- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)
- kaiser: make sure not to touch stack after CR3 switch in compat syscall return
- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- mISDN: fix a loop count (bsc#1077191).
- nfsd: do not share group_info among threads (bsc@1070623).
- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).
- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075088).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075088).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).
- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).
- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).
- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).
- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).
- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper (bsc#1068032, bsc#1075088).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).
- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075088).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).
- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).
- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).
- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032,bsc#1075088).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86, asm: Extend definitions of _ASM_* with a raw format (bsc#1068032 CVE-2017-5754).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bsc#1068032 CVE-2017-5715).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
Patchnames
sdksp4-kernel-20180207-13491,slehasp4-kernel-20180207-13491,slertesp4-kernel-20180207-13491,slessp4-kernel-20180207-13491,slexsp3-kernel-20180207-13491
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building\n the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function\n did not validate a value that is used during DMA page allocation, leading\n to a heap-based out-of-bounds write (related to the rds_rdma_extra_size\n function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in\n net/rds/rdma.c mishandled cases where page pinning fails or an invalid\n address is supplied, leading to an rds_atomic_free_op NULL pointer\n dereference (bnc#1075617).\n- CVE-2017-18017: The tcpmss_mangle_packet function in\n net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers\n to cause a denial of service (use-after-free and memory corruption)\n or possibly have unspecified other impact by leveraging the presence of\n xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed\n attackers to cause a denial of service (NULL pointer dereference and\n system crash) or possibly have unspecified other impact because the\n port-\u003eexists value can change after it is validated (bnc#1077922).\n- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF\u0027s\n assigned to guests to send ethernet flow control pause frames via the\n PF. (bnc#1077355).\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed\n attackers to obtain potentially sensitive information from kernel\n memory, aka a write_mmio stack-based out-of-bounds read, related to\n arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).\n- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream\n kernel skcipher. (bnc#1075908).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability\n existed in the sound system, this can lead to a deadlock and denial of\n service condition (bnc#1076017).\n\nThe following non-security bugs were fixed:\n\n- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).\n- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).\n- alsa: aloop: Release cable upon open error path (bsc#1045538).\n- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).\n- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).\n- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).\n- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).\n- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).\n- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).\n- btrfs: copy fsid to super_block s_uuid (bsc#1080774).\n- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).\n- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).\n- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).\n- btrfs: make the state of the transaction more readable (FATE#325056).\n- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).\n- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).\n- btrfs: reset intwrite on transaction abort (FATE#325056).\n- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).\n- btrfs: stop waiting on current trans if we aborted (FATE#325056).\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- cdrom: factor out common open_for_* code (bsc#1048585).\n- cdrom: wait for tray to close (bsc#1048585).\n- delay: add poll_event_interruptible (bsc#1048585).\n- dm flakey: add corrupt_bio_byte feature (bsc#1080372).\n- dm flakey: add drop_writes (bsc#1080372).\n- dm flakey: error READ bios during the down_interval (bsc#1080372).\n- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).\n- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).\n- dm flakey: introduce \u0027error_writes\u0027 feature (bsc#1080372).\n- dm flakey: support feature args (bsc#1080372).\n- dm flakey: use dm_target_offset and support discards (bsc#1080372).\n- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).\n- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).\n- ext3: add necessary check in case IO error happens (bnc#1069508).\n- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).\n- fork: clear thread stack upon allocation (bsc#1077560).\n- kaiser: Add proper NX handling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).\n- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz\n- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.\n- kaiser: Fix trampoline stack loading issue on XEN PV\n- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)\n- kaiser: make sure not to touch stack after CR3 switch in compat syscall return\n- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).\n- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).\n- mISDN: fix a loop count (bsc#1077191).\n- nfsd: do not share group_info among threads (bsc@1070623).\n- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).\n- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).\n- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).\n- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).\n- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).\n- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032, bsc#1075088).\n- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075088).\n- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).\n- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).\n- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).\n- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).\n- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).\n- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).\n- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).\n- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).\n- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).\n- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).\n- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags \u0026 wrapper (bsc#1068032, bsc#1075088).\n- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).\n- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032, bsc#1075088).\n- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).\n- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).\n- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).\n- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).\n- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).\n- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075088).\n- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).\n- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).\n- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).\n- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).\n- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).\n- rfi-flush: Switch to new linear fallback flush (bsc#1068032,bsc#1075088).\n- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).\n- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).\n- scsi: sr: wait for the medium to become ready (bsc#1048585).\n- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).\n- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86, asm: Extend definitions of _ASM_* with a raw format (bsc#1068032 CVE-2017-5754).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).\n- x86/kaiser: use trampoline stack for kernel entry.\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).\n- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bsc#1068032 CVE-2017-5715).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-20180207-13491,slehasp4-kernel-20180207-13491,slertesp4-kernel-20180207-13491,slessp4-kernel-20180207-13491,slexsp3-kernel-20180207-13491", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0555-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0555-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180555-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0555-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1045538", "url": "https://bugzilla.suse.com/1045538" }, { "category": "self", "summary": "SUSE Bug 1048585", "url": "https://bugzilla.suse.com/1048585" }, { "category": "self", "summary": "SUSE Bug 1050431", "url": "https://bugzilla.suse.com/1050431" }, { "category": "self", "summary": "SUSE Bug 1054305", "url": "https://bugzilla.suse.com/1054305" }, { "category": "self", "summary": "SUSE Bug 1059174", "url": "https://bugzilla.suse.com/1059174" }, { "category": "self", "summary": "SUSE Bug 1060279", "url": "https://bugzilla.suse.com/1060279" }, { "category": "self", "summary": "SUSE Bug 1060682", "url": "https://bugzilla.suse.com/1060682" }, { "category": "self", "summary": "SUSE Bug 1063544", "url": "https://bugzilla.suse.com/1063544" }, { "category": "self", "summary": "SUSE Bug 1064861", "url": "https://bugzilla.suse.com/1064861" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1068984", "url": "https://bugzilla.suse.com/1068984" }, { "category": "self", "summary": "SUSE Bug 1069508", "url": "https://bugzilla.suse.com/1069508" }, { "category": "self", "summary": "SUSE Bug 1070623", "url": "https://bugzilla.suse.com/1070623" }, { "category": "self", "summary": "SUSE Bug 1070781", "url": "https://bugzilla.suse.com/1070781" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1074488", "url": "https://bugzilla.suse.com/1074488" }, { "category": "self", "summary": "SUSE Bug 1074621", "url": "https://bugzilla.suse.com/1074621" }, { "category": "self", "summary": "SUSE Bug 1074880", "url": "https://bugzilla.suse.com/1074880" }, { "category": "self", "summary": "SUSE Bug 1075088", "url": "https://bugzilla.suse.com/1075088" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075410", "url": "https://bugzilla.suse.com/1075410" }, { "category": "self", "summary": "SUSE Bug 1075617", "url": "https://bugzilla.suse.com/1075617" }, { "category": "self", "summary": "SUSE Bug 1075621", "url": "https://bugzilla.suse.com/1075621" }, { "category": "self", "summary": "SUSE Bug 1075908", "url": "https://bugzilla.suse.com/1075908" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1076154", "url": "https://bugzilla.suse.com/1076154" }, { "category": "self", "summary": "SUSE Bug 1076278", "url": "https://bugzilla.suse.com/1076278" }, { "category": "self", "summary": "SUSE Bug 1076437", "url": "https://bugzilla.suse.com/1076437" }, { "category": "self", "summary": "SUSE Bug 1076849", "url": "https://bugzilla.suse.com/1076849" }, { "category": "self", "summary": "SUSE Bug 1077191", "url": "https://bugzilla.suse.com/1077191" }, { "category": "self", "summary": "SUSE Bug 1077355", "url": "https://bugzilla.suse.com/1077355" }, { "category": "self", "summary": "SUSE Bug 1077406", "url": "https://bugzilla.suse.com/1077406" }, { "category": "self", "summary": "SUSE Bug 1077487", "url": "https://bugzilla.suse.com/1077487" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1077922", "url": "https://bugzilla.suse.com/1077922" }, { "category": "self", "summary": "SUSE Bug 1078875", "url": "https://bugzilla.suse.com/1078875" }, { "category": "self", "summary": "SUSE Bug 1079917", "url": "https://bugzilla.suse.com/1079917" }, { "category": "self", "summary": "SUSE Bug 1080133", "url": "https://bugzilla.suse.com/1080133" }, { "category": "self", "summary": "SUSE Bug 1080359", "url": "https://bugzilla.suse.com/1080359" }, { "category": "self", "summary": "SUSE Bug 1080363", "url": "https://bugzilla.suse.com/1080363" }, { "category": "self", "summary": "SUSE Bug 1080372", "url": "https://bugzilla.suse.com/1080372" }, { "category": "self", "summary": "SUSE Bug 1080579", "url": "https://bugzilla.suse.com/1080579" }, { "category": "self", "summary": "SUSE Bug 1080685", "url": "https://bugzilla.suse.com/1080685" }, { "category": "self", "summary": "SUSE Bug 1080774", "url": "https://bugzilla.suse.com/1080774" }, { "category": "self", "summary": "SUSE Bug 1081500", "url": "https://bugzilla.suse.com/1081500" }, { "category": "self", "summary": "SUSE Bug 936530", "url": "https://bugzilla.suse.com/936530" }, { "category": "self", "summary": "SUSE Bug 962257", "url": "https://bugzilla.suse.com/962257" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1142857 page", "url": "https://www.suse.com/security/cve/CVE-2015-1142857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13215 page", "url": "https://www.suse.com/security/cve/CVE-2017-13215/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18017 page", "url": "https://www.suse.com/security/cve/CVE-2017-18017/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18079 page", "url": "https://www.suse.com/security/cve/CVE-2017-18079/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-02-27T16:16:04Z", "generator": { "date": "2018-02-27T16:16:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0555-1", "initial_release_date": "2018-02-27T16:16:04Z", "revision_history": [ { "date": "2018-02-27T16:16:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "product": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586" } }, { "category": "product_version", "name": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "product": { "name": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "product_id": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586" } }, { "category": "product_version", "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "product": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586" } }, { "category": "product_version", "name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "product": { "name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "product_id": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586" } }, { "category": "product_version", "name": "drbd-8.4.4-0.27.4.2.i586", "product": { "name": "drbd-8.4.4-0.27.4.2.i586", "product_id": "drbd-8.4.4-0.27.4.2.i586" } }, { "category": "product_version", "name": "drbd-bash-completion-8.4.4-0.27.4.2.i586", "product": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.i586", "product_id": "drbd-bash-completion-8.4.4-0.27.4.2.i586" } }, { "category": "product_version", "name": "drbd-heartbeat-8.4.4-0.27.4.2.i586", "product": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.i586", "product_id": "drbd-heartbeat-8.4.4-0.27.4.2.i586" } }, { "category": "product_version", "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "product": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586" } }, { "category": "product_version", "name": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "product": { "name": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "product_id": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586" } }, { "category": "product_version", "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "product": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586" } }, { "category": "product_version", "name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "product": { "name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "product_id": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586" } }, { "category": "product_version", "name": "drbd-pacemaker-8.4.4-0.27.4.2.i586", "product": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.i586", "product_id": "drbd-pacemaker-8.4.4-0.27.4.2.i586" } }, { "category": "product_version", "name": "drbd-udev-8.4.4-0.27.4.2.i586", "product": { "name": "drbd-udev-8.4.4-0.27.4.2.i586", "product_id": "drbd-udev-8.4.4-0.27.4.2.i586" } }, { "category": "product_version", "name": "drbd-utils-8.4.4-0.27.4.2.i586", "product": { "name": "drbd-utils-8.4.4-0.27.4.2.i586", "product_id": "drbd-utils-8.4.4-0.27.4.2.i586" } }, { "category": "product_version", "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "product": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586" } }, { "category": "product_version", "name": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "product": { "name": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "product_id": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586" } }, { "category": "product_version", "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "product": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586" } }, { "category": "product_version", "name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "product": { "name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "product_id": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586" } }, { "category": "product_version", "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "product": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586" } }, { "category": "product_version", "name": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "product": { "name": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "product_id": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586" } }, { "category": "product_version", "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "product": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586" } }, { "category": "product_version", "name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "product": { "name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "product_id": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.35.1.i586", "product": { "name": "kernel-default-3.0.101-108.35.1.i586", "product_id": "kernel-default-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.35.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.35.1.i586", "product_id": "kernel-default-base-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.35.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.35.1.i586", "product_id": "kernel-default-devel-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.35.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.35.1.i586", "product_id": "kernel-ec2-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.35.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.35.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.35.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.35.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.35.1.i586", "product": { "name": "kernel-pae-3.0.101-108.35.1.i586", "product_id": "kernel-pae-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.35.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.35.1.i586", "product_id": "kernel-pae-base-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.35.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.35.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.35.1.i586", "product": { "name": "kernel-source-3.0.101-108.35.1.i586", "product_id": "kernel-source-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.35.1.i586", "product": { "name": "kernel-syms-3.0.101-108.35.1.i586", "product_id": "kernel-syms-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.35.1.i586", "product": { "name": "kernel-trace-3.0.101-108.35.1.i586", "product_id": "kernel-trace-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.35.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.35.1.i586", "product_id": "kernel-trace-base-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.35.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.35.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.35.1.i586", "product": { "name": "kernel-xen-3.0.101-108.35.1.i586", "product_id": "kernel-xen-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.35.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.35.1.i586", "product_id": "kernel-xen-base-3.0.101-108.35.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.35.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.35.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.35.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "product": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64" } }, { "category": "product_version", "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "product": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64" } }, { "category": "product_version", "name": "drbd-8.4.4-0.27.4.2.ia64", "product": { "name": "drbd-8.4.4-0.27.4.2.ia64", "product_id": "drbd-8.4.4-0.27.4.2.ia64" } }, { "category": "product_version", "name": "drbd-bash-completion-8.4.4-0.27.4.2.ia64", "product": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.ia64", "product_id": "drbd-bash-completion-8.4.4-0.27.4.2.ia64" } }, { "category": "product_version", "name": "drbd-heartbeat-8.4.4-0.27.4.2.ia64", "product": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.ia64", "product_id": "drbd-heartbeat-8.4.4-0.27.4.2.ia64" } }, { "category": "product_version", "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "product": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64" } }, { "category": "product_version", "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "product": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64" } }, { "category": "product_version", "name": "drbd-pacemaker-8.4.4-0.27.4.2.ia64", "product": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.ia64", "product_id": "drbd-pacemaker-8.4.4-0.27.4.2.ia64" } }, { "category": "product_version", "name": "drbd-udev-8.4.4-0.27.4.2.ia64", "product": { "name": "drbd-udev-8.4.4-0.27.4.2.ia64", "product_id": "drbd-udev-8.4.4-0.27.4.2.ia64" } }, { "category": "product_version", "name": "drbd-utils-8.4.4-0.27.4.2.ia64", "product": { "name": "drbd-utils-8.4.4-0.27.4.2.ia64", "product_id": "drbd-utils-8.4.4-0.27.4.2.ia64" } }, { "category": "product_version", "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "product": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64" } }, { "category": "product_version", "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "product": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "product": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64" } }, { "category": "product_version", "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "product": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.35.1.ia64", "product": { "name": "kernel-default-3.0.101-108.35.1.ia64", "product_id": "kernel-default-3.0.101-108.35.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.35.1.ia64", "product": { "name": "kernel-default-base-3.0.101-108.35.1.ia64", "product_id": "kernel-default-base-3.0.101-108.35.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.35.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-108.35.1.ia64", "product_id": "kernel-default-devel-3.0.101-108.35.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.35.1.ia64", "product": { "name": "kernel-source-3.0.101-108.35.1.ia64", "product_id": "kernel-source-3.0.101-108.35.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.35.1.ia64", "product": { "name": "kernel-syms-3.0.101-108.35.1.ia64", "product_id": "kernel-syms-3.0.101-108.35.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.35.1.ia64", "product": { "name": "kernel-trace-3.0.101-108.35.1.ia64", "product_id": "kernel-trace-3.0.101-108.35.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.35.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-108.35.1.ia64", "product_id": "kernel-trace-base-3.0.101-108.35.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.35.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-108.35.1.ia64", "product_id": "kernel-trace-devel-3.0.101-108.35.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-108.35.1.noarch", "product": { "name": "kernel-docs-3.0.101-108.35.1.noarch", "product_id": "kernel-docs-3.0.101-108.35.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "product": { "name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "product_id": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "product": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64" } }, { "category": "product_version", "name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "product": { "name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "product_id": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64" } }, { "category": "product_version", "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "product": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64" } }, { "category": "product_version", "name": "drbd-8.4.4-0.27.4.2.ppc64", "product": { "name": "drbd-8.4.4-0.27.4.2.ppc64", "product_id": "drbd-8.4.4-0.27.4.2.ppc64" } }, { "category": "product_version", "name": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "product": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "product_id": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64" } }, { "category": "product_version", "name": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "product": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "product_id": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64" } }, { "category": "product_version", "name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "product": { "name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "product_id": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64" } }, { "category": "product_version", "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "product": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64" } }, { "category": "product_version", "name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "product": { "name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "product_id": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64" } }, { "category": "product_version", "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "product": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64" } }, { "category": "product_version", "name": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "product": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "product_id": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64" } }, { "category": "product_version", "name": "drbd-udev-8.4.4-0.27.4.2.ppc64", "product": { "name": "drbd-udev-8.4.4-0.27.4.2.ppc64", "product_id": "drbd-udev-8.4.4-0.27.4.2.ppc64" } }, { "category": "product_version", "name": "drbd-utils-8.4.4-0.27.4.2.ppc64", "product": { "name": "drbd-utils-8.4.4-0.27.4.2.ppc64", "product_id": "drbd-utils-8.4.4-0.27.4.2.ppc64" } }, { "category": "product_version", "name": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "product": { "name": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "product_id": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64" } }, { "category": "product_version", "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "product": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64" } }, { "category": "product_version", "name": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "product": { "name": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "product_id": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64" } }, { "category": "product_version", "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "product": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64" } }, { "category": "product_version", "name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "product": { "name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "product_id": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "product": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64" } }, { "category": "product_version", "name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "product": { "name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "product_id": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64" } }, { "category": "product_version", "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "product": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.35.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.35.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.35.1.ppc64", "product_id": "kernel-default-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.35.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.35.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.35.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.35.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.35.1.ppc64", "product_id": "kernel-source-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.35.1.ppc64", "product_id": "kernel-syms-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.35.1.ppc64", "product_id": "kernel-trace-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.35.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.35.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.35.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.35.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.35.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "product": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "product": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x" } }, { "category": "product_version", "name": "drbd-8.4.4-0.27.4.2.s390x", "product": { "name": "drbd-8.4.4-0.27.4.2.s390x", "product_id": "drbd-8.4.4-0.27.4.2.s390x" } }, { "category": "product_version", "name": "drbd-bash-completion-8.4.4-0.27.4.2.s390x", "product": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.s390x", "product_id": "drbd-bash-completion-8.4.4-0.27.4.2.s390x" } }, { "category": "product_version", "name": "drbd-heartbeat-8.4.4-0.27.4.2.s390x", "product": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.s390x", "product_id": "drbd-heartbeat-8.4.4-0.27.4.2.s390x" } }, { "category": "product_version", "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "product": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x" } }, { "category": "product_version", "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "product": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x" } }, { "category": "product_version", "name": "drbd-pacemaker-8.4.4-0.27.4.2.s390x", "product": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.s390x", "product_id": "drbd-pacemaker-8.4.4-0.27.4.2.s390x" } }, { "category": "product_version", "name": "drbd-udev-8.4.4-0.27.4.2.s390x", "product": { "name": "drbd-udev-8.4.4-0.27.4.2.s390x", "product_id": "drbd-udev-8.4.4-0.27.4.2.s390x" } }, { "category": "product_version", "name": "drbd-utils-8.4.4-0.27.4.2.s390x", "product": { "name": "drbd-utils-8.4.4-0.27.4.2.s390x", "product_id": "drbd-utils-8.4.4-0.27.4.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "product": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "product": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "product": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "product": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.35.1.s390x", "product": { "name": "kernel-default-3.0.101-108.35.1.s390x", "product_id": "kernel-default-3.0.101-108.35.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.35.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.35.1.s390x", "product_id": "kernel-default-base-3.0.101-108.35.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.35.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.35.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.35.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.35.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.35.1.s390x", "product_id": "kernel-default-man-3.0.101-108.35.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.35.1.s390x", "product": { "name": "kernel-source-3.0.101-108.35.1.s390x", "product_id": "kernel-source-3.0.101-108.35.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.35.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.35.1.s390x", "product_id": "kernel-syms-3.0.101-108.35.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.35.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.35.1.s390x", "product_id": "kernel-trace-3.0.101-108.35.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.35.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.35.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.35.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.35.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.35.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.35.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "product": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "product_id": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "product": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "product_id": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "product": { "name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "product_id": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64" } }, { "category": "product_version", "name": "drbd-8.4.4-0.27.4.2.x86_64", "product": { "name": "drbd-8.4.4-0.27.4.2.x86_64", "product_id": "drbd-8.4.4-0.27.4.2.x86_64" } }, { "category": "product_version", "name": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "product": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "product_id": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64" } }, { "category": "product_version", "name": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "product": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "product_id": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "product": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "product_id": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "product": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "product_id": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "product": { "name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "product_id": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64" } }, { "category": "product_version", "name": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "product": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "product_id": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64" } }, { "category": "product_version", "name": "drbd-udev-8.4.4-0.27.4.2.x86_64", "product": { "name": "drbd-udev-8.4.4-0.27.4.2.x86_64", "product_id": "drbd-udev-8.4.4-0.27.4.2.x86_64" } }, { "category": "product_version", "name": "drbd-utils-8.4.4-0.27.4.2.x86_64", "product": { "name": "drbd-utils-8.4.4-0.27.4.2.x86_64", "product_id": "drbd-utils-8.4.4-0.27.4.2.x86_64" } }, { "category": "product_version", "name": "drbd-xen-8.4.4-0.27.4.2.x86_64", "product": { "name": "drbd-xen-8.4.4-0.27.4.2.x86_64", "product_id": "drbd-xen-8.4.4-0.27.4.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "product": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "product_id": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "product": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "product_id": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "product": { "name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "product_id": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "product": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "product_id": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "product": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "product": { "name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "product_id": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "product": { "name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "product_id": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "product": { "name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "product_id": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "product": { "name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "product_id": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "product": { "name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "product_id": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "product": { "name": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "product_id": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "product": { "name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "product_id": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "product": { "name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "product_id": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "product": { "name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "product_id": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.35.1.x86_64", "product_id": "kernel-default-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.35.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.35.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.35.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.35.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.35.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.35.1.x86_64", "product_id": "kernel-source-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.35.1.x86_64", "product_id": "kernel-syms-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.35.1.x86_64", "product_id": "kernel-trace-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.35.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.35.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.35.1.x86_64", "product_id": "kernel-xen-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.35.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.35.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.35.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.35.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-hae:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-108.35.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" }, "product_reference": "kernel-docs-3.0.101-108.35.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64" }, "product_reference": "cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586" }, "product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64" }, "product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64" }, "product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x" }, "product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64" }, "product_reference": "cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586" }, "product_reference": "cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64" }, "product_reference": "cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586" }, "product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64" }, "product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64" }, "product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x" }, "product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64" }, "product_reference": "cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586" }, "product_reference": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64" }, "product_reference": "cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586" }, "product_reference": "drbd-8.4.4-0.27.4.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64" }, "product_reference": "drbd-8.4.4-0.27.4.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64" }, "product_reference": "drbd-8.4.4-0.27.4.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x" }, "product_reference": "drbd-8.4.4-0.27.4.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64" }, "product_reference": "drbd-8.4.4-0.27.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586" }, "product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64" }, "product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64" }, "product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x" }, "product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64" }, "product_reference": "drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586" }, "product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64" }, "product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64" }, "product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x" }, "product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64" }, "product_reference": "drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64" }, "product_reference": "drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586" }, "product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64" }, "product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64" }, "product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x" }, "product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64" }, "product_reference": "drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586" }, "product_reference": "drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64" }, "product_reference": "drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586" }, "product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64" }, "product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64" }, "product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x" }, "product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64" }, "product_reference": "drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586" }, "product_reference": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64" }, "product_reference": "drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586" }, "product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64" }, "product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64" }, "product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x" }, "product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64" }, "product_reference": "drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-udev-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586" }, "product_reference": "drbd-udev-8.4.4-0.27.4.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-udev-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64" }, "product_reference": "drbd-udev-8.4.4-0.27.4.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-udev-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64" }, "product_reference": "drbd-udev-8.4.4-0.27.4.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-udev-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x" }, "product_reference": "drbd-udev-8.4.4-0.27.4.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-udev-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64" }, "product_reference": "drbd-udev-8.4.4-0.27.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-utils-8.4.4-0.27.4.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586" }, "product_reference": "drbd-utils-8.4.4-0.27.4.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-utils-8.4.4-0.27.4.2.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64" }, "product_reference": "drbd-utils-8.4.4-0.27.4.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-utils-8.4.4-0.27.4.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64" }, "product_reference": "drbd-utils-8.4.4-0.27.4.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-utils-8.4.4-0.27.4.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x" }, "product_reference": "drbd-utils-8.4.4-0.27.4.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-utils-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64" }, "product_reference": "drbd-utils-8.4.4-0.27.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-xen-8.4.4-0.27.4.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64" }, "product_reference": "drbd-xen-8.4.4-0.27.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64" }, "product_reference": "gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586" }, "product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64" }, "product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64" }, "product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x" }, "product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64" }, "product_reference": "gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586" }, "product_reference": "gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64" }, "product_reference": "gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586" }, "product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64" }, "product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64" }, "product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x" }, "product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64" }, "product_reference": "gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586" }, "product_reference": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64" }, "product_reference": "gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64" }, "product_reference": "ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586" }, "product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64" }, "product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64" }, "product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x" }, "product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64" }, "product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586" }, "product_reference": "ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64" }, "product_reference": "ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586" }, "product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64" }, "product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64" }, "product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x" }, "product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64" }, "product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586" }, "product_reference": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64" }, "product_reference": "ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64" }, "product_reference": "cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64" }, "product_reference": "cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64" }, "product_reference": "drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64" }, "product_reference": "drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64" }, "product_reference": "gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64" }, "product_reference": "gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64" }, "product_reference": "ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64" }, "product_reference": "ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586" }, "product_reference": "kernel-default-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586" }, "product_reference": "kernel-source-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586" }, "product_reference": "kernel-default-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586" }, "product_reference": "kernel-source-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.35.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1142857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1142857" } ], "notes": [ { "category": "general", "text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1142857", "url": "https://www.suse.com/security/cve/CVE-2015-1142857" }, { "category": "external", "summary": "SUSE Bug 1077355 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1077355" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1105108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "moderate" } ], "title": "CVE-2015-1142857" }, { "cve": "CVE-2017-13215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13215" } ], "notes": [ { "category": "general", "text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13215", "url": "https://www.suse.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "SUSE Bug 1075908 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1075908" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "moderate" } ], "title": "CVE-2017-13215" }, { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-18017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18017" } ], "notes": [ { "category": "general", "text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18017", "url": "https://www.suse.com/security/cve/CVE-2017-18017" }, { "category": "external", "summary": "SUSE Bug 1074488 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1074488" }, { "category": "external", "summary": "SUSE Bug 1080255 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1080255" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2017-18017", "url": "https://bugzilla.suse.com/971126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "important" } ], "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18079" } ], "notes": [ { "category": "general", "text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18079", "url": "https://www.suse.com/security/cve/CVE-2017-18079" }, { "category": "external", "summary": "SUSE Bug 1077922 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1077922" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "low" } ], "title": "CVE-2017-18079" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-bash-completion-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-heartbeat-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-pacemaker-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-udev-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-utils-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:drbd-xen-8.4.4-0.27.4.2.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.35.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-02-27T16:16:04Z", "details": "low" } ], "title": "CVE-2018-5333" } ] }
suse-su-2018:0660-1
Vulnerability from csaf_suse
Published
2018-03-12 06:47
Modified
2018-03-12 06:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated (bnc#1077922).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).
The following non-security bugs were fixed:
- cdc-acm: apply quirk for card reader (bsc#1060279).
- Enable CPU vulnerabilities reporting via sysfs
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- Move kABI fixup for retpolines to proper place.
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
Patchnames
sleposp3-kernel-20180212-13505,slessp3-kernel-20180212-13505,slexsp3-kernel-20180212-13505
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).\n- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).\n- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated (bnc#1077922).\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).\n- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).\n- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).\n\nThe following non-security bugs were fixed:\n\n- cdc-acm: apply quirk for card reader (bsc#1060279).\n- Enable CPU vulnerabilities reporting via sysfs\n- fork: clear thread stack upon allocation (bsc#1077560).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).\n- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).\n- Move kABI fixup for retpolines to proper place.\n- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).\n- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).\n- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).\n- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).\n- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).\n- x86/kaiser: use trampoline stack for kernel entry.\n- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).\n- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).\n- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).\n- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-kernel-20180212-13505,slessp3-kernel-20180212-13505,slexsp3-kernel-20180212-13505", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0660-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0660-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180660-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0660-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1054305", "url": "https://bugzilla.suse.com/1054305" }, { "category": "self", "summary": "SUSE Bug 1060279", "url": "https://bugzilla.suse.com/1060279" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1068984", "url": "https://bugzilla.suse.com/1068984" }, { "category": "self", "summary": "SUSE Bug 1070781", "url": "https://bugzilla.suse.com/1070781" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1074488", "url": "https://bugzilla.suse.com/1074488" }, { "category": "self", "summary": "SUSE Bug 1074621", "url": "https://bugzilla.suse.com/1074621" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075410", "url": "https://bugzilla.suse.com/1075410" }, { "category": "self", "summary": "SUSE Bug 1075617", "url": "https://bugzilla.suse.com/1075617" }, { "category": "self", "summary": "SUSE Bug 1075621", "url": "https://bugzilla.suse.com/1075621" }, { "category": "self", "summary": "SUSE Bug 1075908", "url": "https://bugzilla.suse.com/1075908" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1076154", "url": "https://bugzilla.suse.com/1076154" }, { "category": "self", "summary": "SUSE Bug 1076278", "url": "https://bugzilla.suse.com/1076278" }, { "category": "self", "summary": "SUSE Bug 1076849", "url": "https://bugzilla.suse.com/1076849" }, { "category": "self", "summary": "SUSE Bug 1077406", "url": "https://bugzilla.suse.com/1077406" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1077922", "url": "https://bugzilla.suse.com/1077922" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13215 page", "url": "https://www.suse.com/security/cve/CVE-2017-13215/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18017 page", "url": "https://www.suse.com/security/cve/CVE-2017-18017/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18079 page", "url": "https://www.suse.com/security/cve/CVE-2017-18079/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-03-12T06:47:24Z", "generator": { "date": "2018-03-12T06:47:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0660-1", "initial_release_date": "2018-03-12T06:47:24Z", "revision_history": [ { "date": "2018-03-12T06:47:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-default-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-pae-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-source-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-syms-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-trace-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-xen-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.106.19.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-default-3.0.101-0.47.106.19.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.106.19.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.106.19.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-source-3.0.101-0.47.106.19.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.106.19.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.106.19.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13215" } ], "notes": [ { "category": "general", "text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13215", "url": "https://www.suse.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "SUSE Bug 1075908 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1075908" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-12T06:47:24Z", "details": "moderate" } ], "title": "CVE-2017-13215" }, { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-12T06:47:24Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-18017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18017" } ], "notes": [ { "category": "general", "text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18017", "url": "https://www.suse.com/security/cve/CVE-2017-18017" }, { "category": "external", "summary": "SUSE Bug 1074488 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1074488" }, { "category": "external", "summary": "SUSE Bug 1080255 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1080255" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2017-18017", "url": "https://bugzilla.suse.com/971126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-12T06:47:24Z", "details": "important" } ], "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18079" } ], "notes": [ { "category": "general", "text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18079", "url": "https://www.suse.com/security/cve/CVE-2017-18079" }, { "category": "external", "summary": "SUSE Bug 1077922 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1077922" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-12T06:47:24Z", "details": "low" } ], "title": "CVE-2017-18079" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-12T06:47:24Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-12T06:47:24Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-12T06:47:24Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.19.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-12T06:47:24Z", "details": "low" } ], "title": "CVE-2018-5333" } ] }
suse-su-2018:1772-1
Vulnerability from csaf_suse
Published
2018-06-21 11:53
Modified
2018-06-21 11:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.136 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
not handle unsigned integer overflow properly. As a result, a large value of
the 'ie_len' argument could have caused a buffer overflow (bnc#1097356).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
nid, which allowed local users to cause a denial of service (race condition) or
possibly have unspecified other impact via concurrent threads (bnc#1087036).
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
registers) between processes. These registers might contain encryption keys
when doing SSE accelerated AES enc/decryption (bsc#1087086).
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
option that triggers a NULL value for a flush_cmd_control data structure
(bnc#1086400).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers
to obtain potentially sensitive information from kernel memory, aka a
write_mmio stack-based out-of-bounds read (bnc#1073311).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c, a memory
corruption bug in JFS can be triggered by calling setxattr twice with two
different extended attribute names on the same file. This vulnerability
can be triggered by an unprivileged user with the ability to create
files and execute programs. A kmalloc call is incorrect, leading to
slab-out-of-bounds in jfs_xattr (bnc#1097234).
The following non-security bugs were fixed:
- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).
- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).
- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).
- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).
- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).
- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).
- af_key: Always verify length of provided sadb_key (bnc#1012382).
- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).
- alsa: control: fix a redundant-copy issue (bnc#1012382).
- alsa: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).
- alsa: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).
- alsa: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).
- alsa: timer: Fix pause event notification (bnc#1012382 bsc#973378).
- alsa: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).
- alsa: vmaster: Propagate slave error (bnc#1012382).
- arc: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).
- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).
- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).
- arm64: Add 'ssbd' command-line option (bsc#1085308).
- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).
- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).
- arm64: alternatives: Add dynamic patching feature (bsc#1085308).
- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).
- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).
- arm64: do not call C code with el0's fp register (bsc#1085308).
- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).
- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).
- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).
- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).
- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).
- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).
- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).
- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).
- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).
- arm: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).
- arm: OMAP: Fix dmtimer init for omap1 (bnc#1012382).
- asm-generic: provide generic_pmdp_establish() (bnc#1012382).
- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).
- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).
- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).
- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).
- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).
- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).
- audit: return on memory error to avoid null pointer dereference (bnc#1012382).
- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).
- autofs: change autofs4_wait() to take struct path (bsc#1086716).
- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).
- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).
- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).
- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).
- batman-adv: fix packet checksum in receive path (bnc#1012382).
- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).
- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).
- bcache: fix for allocator and register thread race (bnc#1012382).
- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).
- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).
- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).
- bcache: return attach error when no cache set exist (bnc#1012382).
- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).
- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).
- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).
- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).
- bnx2x: use the right constant (bnc#1012382).
- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).
- bonding: do not allow rlb updates to invalid mac (bnc#1012382).
- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).
- brcmfmac: Fix check for ISO3166 code (bnc#1012382).
- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).
- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).
- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).
- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).
- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).
- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).
- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).
- Btrfs: Fix possible softlock on single core machines (bnc#1012382).
- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).
- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).
- Btrfs: fix xattr loss after power failure (bnc#1012382).
- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).
- Btrfs: set plug for fsync (bnc#1012382).
- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).
- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).
- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).
- ceph: fix race of queuing delayed caps (bsc#1096214).
- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).
- cfg80211: further limit wiphy names to 64 bytes (git-fixes).
- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).
- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).
- clk: Do not show the incorrect clock phase (bnc#1012382).
- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).
- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).
- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).
- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).
- config: arm64: enable Spectre-v4 per-thread mitigation
- Correct the prefix in references tag in previous patches (bsc#1041740).
- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).
- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).
- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).
- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).
- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).
- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).
- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).
- dccp: fix tasklet usage (bnc#1012382).
- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).
- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).
- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).
- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).
- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).
- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).
- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).
- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).
- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).
- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).
- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).
- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).
- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).
- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).
- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).
- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).
- efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode (bnc#1012382).
- enic: enable rq before updating rq descriptors (bnc#1012382).
- enic: set DMA mask to 47 bit (bnc#1012382).
- ext2: fix a block leak (bnc#1012382).
- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).
- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).
- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).
- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).
- fix io_destroy()/aio_complete() race (bnc#1012382).
- Force log to disk before reading the AGF during a fstrim (bnc#1012382).
- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).
- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).
- futex: futex_wake_op, do not fail on invalid op (git-fixes).
- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).
- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).
- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).
- gfs2: Fix fallocate chunk size (bnc#1012382).
- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).
- gpio: No NULL owner (bnc#1012382).
- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).
- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).
- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).
- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).
- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).
- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).
- hwrng: stm32 - add reset during probe (bnc#1012382).
- hwtracing: stm: fix build error on some arches (bnc#1012382).
- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).
- i2c: rcar: check master irqs before slave irqs (bnc#1012382).
- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).
- i2c: rcar: init new messages in irq (bnc#1012382).
- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).
- i2c: rcar: refactor setup of a msg (bnc#1012382).
- i2c: rcar: remove spinlock (bnc#1012382).
- i2c: rcar: remove unused IOERROR state (bnc#1012382).
- i2c: rcar: revoke START request early (bnc#1012382).
- i2c: rcar: rework hw init (bnc#1012382).
- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).
- iio:kfifo_buf: check for uint overflow (bnc#1012382).
- ima: Fallback to the builtin hash algorithm (bnc#1012382).
- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).
- init: fix false positives in W+X checking (bsc#1096982).
- input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).
- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).
- input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).
- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).
- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).
- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).
- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).
- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).
- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).
- ipv4: remove warning in ip_recv_error (bnc#1012382).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- irda: fix overly long udelay() (bnc#1012382).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).
- isdn: eicon: fix a missing-check bug (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (bnc#1012382 git-fixes).
- kabi: vfs: Restore dentry_operations->d_manage (bsc#1086716).
- kasan: fix memory hotplug during boot (bnc#1012382).
- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).
- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).
- kconfig: Do not leak main menus during parsing (bnc#1012382).
- kconfig: Fix automatic menu creation mem leak (bnc#1012382).
- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).
- kdb: make 'mdr' command repeat (bnc#1012382).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, LTC#168596).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).
- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).
- kvm: Fix spelling mistake: 'cop_unsuable' -> 'cop_unusable' (bnc#1012382).
- kvm: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).
- kvm: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).
- kvm: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).
- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).
- kvm: x86: introduce linear_{read,write}_system (bnc#1012382).
- kvm: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).
- kvm: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).
- l2tp: revert 'l2tp: fix missing print session offset info' (bnc#1012382).
- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).
- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).
- llc: better deal with too small mtu (bnc#1012382).
- llc: properly handle dev_queue_xmit() return value (bnc#1012382).
- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).
- locking/qspinlock: Ensure node->count is updated before initialising node (bnc#1012382).
- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).
- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).
- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).
- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).
- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).
- md/raid1: fix NULL pointer dereference (bnc#1012382).
- md: raid5: avoid string overflow warning (bnc#1012382).
- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).
- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).
- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).
- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).
- media: em28xx: USB bulk packet size fix (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).
- mmap: introduce sane default mmap limits (bnc#1012382).
- mmap: relax file size limit for regular files (bnc#1012382).
- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).
- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).
- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (bnc#1012382 bnc#971975).
- mm: filemap: remove redundant code in do_read_cache_page (bnc#1012382 bnc#971975).
- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).
- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).
- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).
- mm/ksm: fix interaction with THP (bnc#1012382).
- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).
- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).
- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).
- netdev-FAQ: clarify DaveM's position for stable backports (bnc#1012382).
- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).
- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).
- net: Fix untag for vlan packets without ethernet header (bnc#1012382).
- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).
- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).
- net: metrics: add proper netlink validation (bnc#1012382).
- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).
- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).
- net/mlx5: Protect from command bit overflow (bnc#1012382).
- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).
- net/packet: refine check for priv area size (bnc#1012382).
- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).
- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).
- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).
- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).
- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).
- net: test tailroom before appending to linear skb (bnc#1012382).
- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).
- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).
- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).
- nfc: llcp: Limit size of SDP URI (bnc#1012382).
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).
- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).
- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).
- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).
- ocfs2/acl: use 'ip_xattr_sem' to protect getting extended attribute (bnc#1012382).
- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).
- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).
- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).
- packet: fix reserve calculation (bnc#1012382 git-fixes).
- packet: fix reserve calculation (git-fixes).
- packet: in packet_snd start writing at link layer allocation (bnc#1012382).
- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).
- pci: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).
- pci: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).
- pci: Restore config space on runtime resume despite being unbound (bnc#1012382).
- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).
- perf/cgroup: Fix child event counting bug (bnc#1012382).
- perf/core: Fix perf_output_read_group() (bnc#1012382).
- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).
- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).
- powerpc/64s: Clear PCR on boot (bnc#1012382).
- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).
- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).
- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).
- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).
- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).
- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).
- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).
- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).
- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).
- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).
- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).
- proc: fix /proc/*/map_files lookup (bnc#1012382).
- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).
- proc: meminfo: estimate available memory more conservatively (bnc#1012382).
- proc read mm's {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).
- qed: Fix mask for physical address in ILT entry (bnc#1012382).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).
- r8152: fix tx packets accounting (bnc#1012382).
- r8169: fix powering up RTL8168h (bnc#1012382).
- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).
- RDMA/ucma: Correct option size check using optlen (bnc#1012382).
- RDS: IB: Fix null pointer issue (bnc#1012382).
- Refreshed contents of patches (bsc#1085185)
- regulator: of: Add a missing 'of_node_put()' in an error handling path of 'of_regulator_match()' (bnc#1012382).
- regulatory: add NUL to request alpha2 (bnc#1012382).
- Revert 'arm: dts: imx6qdl-wandboard: Fix audio channel swap' (bnc#1012382).
- Revert 'ima: limit file hash setting by user to fix and log modes' (bnc#1012382).
- Revert 'ipc/shm: Fix shmat mmap nil-page protection' (bnc#1012382).
- Revert 'regulatory: add NUL to request alpha2' (kabi).
- Revert 'vti4: Do not override MTU passed on link creation via IFLA_MTU' (bnc#1012382).
- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).
- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).
- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).
- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).
- rtnetlink: validate attributes in do_setlink() (bnc#1012382).
- s390: add assembler macros for CPU alternatives (bnc#1012382).
- s390/cio: clear timer when terminating driver I/O (bnc#1012382).
- s390/cio: fix return code after missing interrupt (bnc#1012382).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (LTC#168035 bnc#1012382 bnc#1094532).
- s390: extend expoline to BC instructions (bnc#1012382).
- s390/ftrace: use expoline for indirect branches (bnc#1012382).
- s390/kernel: use expoline for indirect branches (bnc#1012382).
- s390/lib: use expoline for indirect branches (bnc#1012382).
- s390: move expoline assembler macros to a header (bnc#1012382).
- s390: move spectre sysfs attribute code (bnc#1012382).
- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).
- s390/qdio: fix access to uninitialized qdio_q fields (LTC#168037 bnc#1012382 bnc#1094532).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).
- s390: use expoline thunks in the BPF JIT (bnc#1012382).
- sched/rt: Fix rq->clock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).
- scripts/git-pre-commit:
- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).
- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).
- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).
- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).
- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).
- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).
- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).
- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).
- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).
- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).
- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).
- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).
- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).
- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).
- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).
- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).
- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).
- scsi: zfcp: fix infinite iteration on ERP ready list (LTC#168038 bnc#1012382 bnc#1094532).
- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).
- sctp: fix the issue that the cookie-ack with auth can't get processed (bnc#1012382).
- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).
- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).
- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).
- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).
- selftests: memfd: add config fragment for fuse (bnc#1012382).
- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).
- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).
- selftests: Print the test we're running to /dev/kmsg (bnc#1012382).
- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).
- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).
- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).
- sh: fix debug trap failure to process signals before return to user (bnc#1012382).
- sh: New gcc support (bnc#1012382).
- signals: avoid unnecessary taking of sighand->siglock (bnc#1012382 bnc#978907).
- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).
- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).
- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).
- sparc64: Fix build warnings with gcc 7 (bnc#1012382).
- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).
- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).
- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).
- staging: rtl8192u: return -ENOMEM on failed allocation of priv->oldaddr (bnc#1012382).
- stm class: Use vmalloc for the master map (bnc#1012382).
- sunvnet: does not support GSO for sctp (bnc#1012382).
- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).
- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: ignore Fast Open on repair mode (bnc#1012382).
- tcp: purge write queue in tcp_connect_init() (bnc#1012382).
- team: use netdev_features_t instead of u32 (bnc#1012382).
- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).
- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).
- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).
- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).
- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).
- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).
- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).
- tools/thermal: tmon: fix for segfault (bnc#1012382).
- tpm: do not suspend/resume if power stays on (bnc#1012382).
- tpm: self test failure should not cause suspend to fail (bnc#1012382).
- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).
- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).
- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).
- udf: Provide saner default for invalid uid / gid (bnc#1012382).
- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).
- usb: dwc2: Fix interval type issue (bnc#1012382).
- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).
- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).
- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).
- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).
- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).
- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).
- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).
- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).
- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).
- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).
- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).
- usb: musb: fix enumeration after resume (bnc#1012382).
- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).
- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).
- vfs: add path_has_submounts() (bsc#1086716).
- vfs: add path_is_mountpoint() helper (bsc#1086716).
- vfs: change d_manage() to take a struct path (bsc#1086716).
- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).
- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).
- vmscan: do not force-scan file lru if its absolute size is small (bnc#1012382).
- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).
- vti4: Do not count header length twice on tunnel setup (bnc#1012382).
- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).
- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).
- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).
- workqueue: use put_device() instead of kfree() (bnc#1012382).
- x86/apic: Set up through-local-APIC mode on the boot CPU if 'noapic' specified (bnc#1012382).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).
- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).
- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).
- x86/devicetree: Initialize device tree before using it (bnc#1012382).
- x86: ENABLE_IBRS is sometimes called early during boot while it should not. Let's drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012
- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).
- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).
- x86/fpu: Revert ('x86/fpu: Disable AVX when eagerfpu is off') (bnc#1012382).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).
- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).
- x86/pkeys: Do not special case protection key 0 (1041740).
- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).
- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).
- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).
- x86/topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).
- xen/acpi: off by one in read_acpi_id() (bnc#1012382).
- xen/grant-table: Use put_page instead of free_page (bnc#1012382).
- xen-netfront: Fix race between device setup and open (bnc#1012382).
- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).
- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).
- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).
- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).
- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).
- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).
- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).
- zorro: Set up z->dev.dma_mask for the DMA API (bnc#1012382).
- xfs: fix incorrect log_flushed on fsync (bnc#1012382).
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-1199,SUSE-SLE-HA-12-SP3-2018-1199,SUSE-SLE-Live-Patching-12-SP3-2018-1199,SUSE-SLE-SDK-12-SP3-2018-1199,SUSE-SLE-SERVER-12-SP3-2018-1199,SUSE-SLE-WE-12-SP3-2018-1199
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.136 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356).\n- CVE-2017-18249: The add_free_nid function did not properly track an allocated\n nid, which allowed local users to cause a denial of service (race condition) or\n possibly have unspecified other impact via concurrent threads (bnc#1087036).\n- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086).\n- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge\n option that triggers a NULL value for a flush_cmd_control data structure\n (bnc#1086400).\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers\n to obtain potentially sensitive information from kernel memory, aka a\n write_mmio stack-based out-of-bounds read (bnc#1073311).\n- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c, a memory\n corruption bug in JFS can be triggered by calling setxattr twice with two\n different extended attribute names on the same file. This vulnerability\n can be triggered by an unprivileged user with the ability to create\n files and execute programs. A kmalloc call is incorrect, leading to\n slab-out-of-bounds in jfs_xattr (bnc#1097234).\n\nThe following non-security bugs were fixed:\n\n- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).\n- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).\n- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).\n- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).\n- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).\n- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).\n- af_key: Always verify length of provided sadb_key (bnc#1012382).\n- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).\n- alsa: control: fix a redundant-copy issue (bnc#1012382).\n- alsa: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).\n- alsa: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).\n- alsa: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).\n- alsa: timer: Fix pause event notification (bnc#1012382 bsc#973378).\n- alsa: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).\n- alsa: vmaster: Propagate slave error (bnc#1012382).\n- arc: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).\n- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).\n- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).\n- arm64: Add \u0027ssbd\u0027 command-line option (bsc#1085308).\n- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).\n- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).\n- arm64: alternatives: Add dynamic patching feature (bsc#1085308).\n- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).\n- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).\n- arm64: do not call C code with el0\u0027s fp register (bsc#1085308).\n- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).\n- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).\n- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).\n- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).\n- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).\n- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).\n- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).\n- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).\n- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).\n- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).\n- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).\n- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).\n- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).\n- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).\n- arm: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).\n- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).\n- arm: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).\n- arm: OMAP: Fix dmtimer init for omap1 (bnc#1012382).\n- asm-generic: provide generic_pmdp_establish() (bnc#1012382).\n- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).\n- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).\n- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).\n- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).\n- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).\n- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).\n- audit: return on memory error to avoid null pointer dereference (bnc#1012382).\n- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).\n- autofs: change autofs4_wait() to take struct path (bsc#1086716).\n- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).\n- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).\n- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).\n- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).\n- batman-adv: fix packet checksum in receive path (bnc#1012382).\n- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).\n- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).\n- bcache: fix for allocator and register thread race (bnc#1012382).\n- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).\n- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).\n- bcache: return attach error when no cache set exist (bnc#1012382).\n- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).\n- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).\n- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).\n- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).\n- bnx2x: use the right constant (bnc#1012382).\n- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).\n- bonding: do not allow rlb updates to invalid mac (bnc#1012382).\n- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).\n- brcmfmac: Fix check for ISO3166 code (bnc#1012382).\n- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).\n- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).\n- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).\n- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).\n- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).\n- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).\n- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).\n- Btrfs: Fix possible softlock on single core machines (bnc#1012382).\n- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).\n- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).\n- Btrfs: fix xattr loss after power failure (bnc#1012382).\n- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).\n- Btrfs: set plug for fsync (bnc#1012382).\n- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).\n- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).\n- ceph: fix race of queuing delayed caps (bsc#1096214).\n- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).\n- cfg80211: further limit wiphy names to 64 bytes (git-fixes).\n- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).\n- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).\n- clk: Do not show the incorrect clock phase (bnc#1012382).\n- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).\n- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).\n- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).\n- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).\n- config: arm64: enable Spectre-v4 per-thread mitigation\n- Correct the prefix in references tag in previous patches (bsc#1041740).\n- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).\n- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).\n- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).\n- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).\n- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).\n- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).\n- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).\n- dccp: fix tasklet usage (bnc#1012382).\n- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).\n- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).\n- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).\n- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).\n- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).\n- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).\n- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).\n- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).\n- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).\n- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).\n- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).\n- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).\n- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).\n- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).\n- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).\n- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).\n- efi: Avoid potential crashes, fix the \u0027struct efi_pci_io_protocol_32\u0027 definition for mixed mode (bnc#1012382).\n- enic: enable rq before updating rq descriptors (bnc#1012382).\n- enic: set DMA mask to 47 bit (bnc#1012382).\n- ext2: fix a block leak (bnc#1012382).\n- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).\n- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).\n- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).\n- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).\n- fix io_destroy()/aio_complete() race (bnc#1012382).\n- Force log to disk before reading the AGF during a fstrim (bnc#1012382).\n- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).\n- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).\n- futex: futex_wake_op, do not fail on invalid op (git-fixes).\n- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).\n- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).\n- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).\n- gfs2: Fix fallocate chunk size (bnc#1012382).\n- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).\n- gpio: No NULL owner (bnc#1012382).\n- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).\n- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).\n- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).\n- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).\n- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).\n- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).\n- hwrng: stm32 - add reset during probe (bnc#1012382).\n- hwtracing: stm: fix build error on some arches (bnc#1012382).\n- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).\n- i2c: rcar: check master irqs before slave irqs (bnc#1012382).\n- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).\n- i2c: rcar: init new messages in irq (bnc#1012382).\n- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).\n- i2c: rcar: refactor setup of a msg (bnc#1012382).\n- i2c: rcar: remove spinlock (bnc#1012382).\n- i2c: rcar: remove unused IOERROR state (bnc#1012382).\n- i2c: rcar: revoke START request early (bnc#1012382).\n- i2c: rcar: rework hw init (bnc#1012382).\n- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).\n- iio:kfifo_buf: check for uint overflow (bnc#1012382).\n- ima: Fallback to the builtin hash algorithm (bnc#1012382).\n- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).\n- init: fix false positives in W+X checking (bsc#1096982).\n- input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).\n- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).\n- input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).\n- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).\n- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).\n- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).\n- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).\n- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).\n- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).\n- ipv4: remove warning in ip_recv_error (bnc#1012382).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- irda: fix overly long udelay() (bnc#1012382).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).\n- isdn: eicon: fix a missing-check bug (bnc#1012382).\n- jffs2: Fix use-after-free bug in jffs2_iget()\u0027s error handling path (bnc#1012382 git-fixes).\n- kabi: vfs: Restore dentry_operations-\u003ed_manage (bsc#1086716).\n- kasan: fix memory hotplug during boot (bnc#1012382).\n- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).\n- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).\n- kconfig: Do not leak main menus during parsing (bnc#1012382).\n- kconfig: Fix automatic menu creation mem leak (bnc#1012382).\n- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).\n- kdb: make \u0027mdr\u0027 command repeat (bnc#1012382).\n- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, LTC#168596).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).\n- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).\n- kvm: Fix spelling mistake: \u0027cop_unsuable\u0027 -\u003e \u0027cop_unusable\u0027 (bnc#1012382).\n- kvm: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).\n- kvm: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).\n- kvm: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).\n- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).\n- kvm: x86: introduce linear_{read,write}_system (bnc#1012382).\n- kvm: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).\n- kvm: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bnc#1012382).\n- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).\n- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).\n- llc: better deal with too small mtu (bnc#1012382).\n- llc: properly handle dev_queue_xmit() return value (bnc#1012382).\n- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).\n- locking/qspinlock: Ensure node-\u003ecount is updated before initialising node (bnc#1012382).\n- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).\n- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).\n- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).\n- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).\n- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).\n- md/raid1: fix NULL pointer dereference (bnc#1012382).\n- md: raid5: avoid string overflow warning (bnc#1012382).\n- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).\n- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).\n- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).\n- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).\n- media: em28xx: USB bulk packet size fix (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).\n- mmap: introduce sane default mmap limits (bnc#1012382).\n- mmap: relax file size limit for regular files (bnc#1012382).\n- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).\n- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).\n- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (bnc#1012382 bnc#971975).\n- mm: filemap: remove redundant code in do_read_cache_page (bnc#1012382 bnc#971975).\n- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).\n- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).\n- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).\n- mm/ksm: fix interaction with THP (bnc#1012382).\n- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).\n- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).\n- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).\n- netdev-FAQ: clarify DaveM\u0027s position for stable backports (bnc#1012382).\n- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).\n- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).\n- net: Fix untag for vlan packets without ethernet header (bnc#1012382).\n- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).\n- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).\n- net: metrics: add proper netlink validation (bnc#1012382).\n- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).\n- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).\n- net/mlx5: Protect from command bit overflow (bnc#1012382).\n- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).\n- net/packet: refine check for priv area size (bnc#1012382).\n- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).\n- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).\n- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).\n- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).\n- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).\n- net: test tailroom before appending to linear skb (bnc#1012382).\n- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).\n- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).\n- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).\n- nfc: llcp: Limit size of SDP URI (bnc#1012382).\n- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).\n- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).\n- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).\n- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).\n- ocfs2/acl: use \u0027ip_xattr_sem\u0027 to protect getting extended attribute (bnc#1012382).\n- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).\n- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).\n- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).\n- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).\n- packet: fix reserve calculation (bnc#1012382 git-fixes).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (bnc#1012382).\n- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).\n- pci: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).\n- pci: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).\n- pci: Restore config space on runtime resume despite being unbound (bnc#1012382).\n- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).\n- perf/cgroup: Fix child event counting bug (bnc#1012382).\n- perf/core: Fix perf_output_read_group() (bnc#1012382).\n- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).\n- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).\n- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).\n- powerpc/64s: Clear PCR on boot (bnc#1012382).\n- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).\n- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).\n- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).\n- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).\n- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).\n- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).\n- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).\n- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).\n- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).\n- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).\n- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).\n- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).\n- proc: fix /proc/*/map_files lookup (bnc#1012382).\n- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).\n- proc: meminfo: estimate available memory more conservatively (bnc#1012382).\n- proc read mm\u0027s {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).\n- qed: Fix mask for physical address in ILT entry (bnc#1012382).\n- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).\n- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).\n- r8152: fix tx packets accounting (bnc#1012382).\n- r8169: fix powering up RTL8168h (bnc#1012382).\n- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).\n- RDMA/ucma: Correct option size check using optlen (bnc#1012382).\n- RDS: IB: Fix null pointer issue (bnc#1012382).\n- Refreshed contents of patches (bsc#1085185)\n- regulator: of: Add a missing \u0027of_node_put()\u0027 in an error handling path of \u0027of_regulator_match()\u0027 (bnc#1012382).\n- regulatory: add NUL to request alpha2 (bnc#1012382).\n- Revert \u0027arm: dts: imx6qdl-wandboard: Fix audio channel swap\u0027 (bnc#1012382).\n- Revert \u0027ima: limit file hash setting by user to fix and log modes\u0027 (bnc#1012382).\n- Revert \u0027ipc/shm: Fix shmat mmap nil-page protection\u0027 (bnc#1012382).\n- Revert \u0027regulatory: add NUL to request alpha2\u0027 (kabi).\n- Revert \u0027vti4: Do not override MTU passed on link creation via IFLA_MTU\u0027 (bnc#1012382).\n- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).\n- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).\n- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).\n- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).\n- rtnetlink: validate attributes in do_setlink() (bnc#1012382).\n- s390: add assembler macros for CPU alternatives (bnc#1012382).\n- s390/cio: clear timer when terminating driver I/O (bnc#1012382).\n- s390/cio: fix return code after missing interrupt (bnc#1012382).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (LTC#168035 bnc#1012382 bnc#1094532).\n- s390: extend expoline to BC instructions (bnc#1012382).\n- s390/ftrace: use expoline for indirect branches (bnc#1012382).\n- s390/kernel: use expoline for indirect branches (bnc#1012382).\n- s390/lib: use expoline for indirect branches (bnc#1012382).\n- s390: move expoline assembler macros to a header (bnc#1012382).\n- s390: move spectre sysfs attribute code (bnc#1012382).\n- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).\n- s390/qdio: fix access to uninitialized qdio_q fields (LTC#168037 bnc#1012382 bnc#1094532).\n- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).\n- s390: use expoline thunks in the BPF JIT (bnc#1012382).\n- sched/rt: Fix rq-\u003eclock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).\n- scripts/git-pre-commit:\n- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).\n- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).\n- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).\n- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).\n- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).\n- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).\n- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).\n- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).\n- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).\n- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).\n- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).\n- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).\n- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).\n- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).\n- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).\n- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).\n- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).\n- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).\n- scsi: zfcp: fix infinite iteration on ERP ready list (LTC#168038 bnc#1012382 bnc#1094532).\n- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).\n- sctp: fix the issue that the cookie-ack with auth can\u0027t get processed (bnc#1012382).\n- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).\n- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).\n- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).\n- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).\n- selftests: memfd: add config fragment for fuse (bnc#1012382).\n- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).\n- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).\n- selftests: Print the test we\u0027re running to /dev/kmsg (bnc#1012382).\n- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).\n- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).\n- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).\n- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).\n- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).\n- sh: fix debug trap failure to process signals before return to user (bnc#1012382).\n- sh: New gcc support (bnc#1012382).\n- signals: avoid unnecessary taking of sighand-\u003esiglock (bnc#1012382 bnc#978907).\n- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).\n- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).\n- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).\n- sparc64: Fix build warnings with gcc 7 (bnc#1012382).\n- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).\n- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).\n- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).\n- staging: rtl8192u: return -ENOMEM on failed allocation of priv-\u003eoldaddr (bnc#1012382).\n- stm class: Use vmalloc for the master map (bnc#1012382).\n- sunvnet: does not support GSO for sctp (bnc#1012382).\n- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).\n- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).\n- tcp: ignore Fast Open on repair mode (bnc#1012382).\n- tcp: purge write queue in tcp_connect_init() (bnc#1012382).\n- team: use netdev_features_t instead of u32 (bnc#1012382).\n- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).\n- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).\n- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).\n- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).\n- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).\n- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).\n- tools/thermal: tmon: fix for segfault (bnc#1012382).\n- tpm: do not suspend/resume if power stays on (bnc#1012382).\n- tpm: self test failure should not cause suspend to fail (bnc#1012382).\n- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).\n- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).\n- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).\n- udf: Provide saner default for invalid uid / gid (bnc#1012382).\n- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).\n- usb: dwc2: Fix interval type issue (bnc#1012382).\n- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).\n- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).\n- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).\n- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).\n- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).\n- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).\n- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).\n- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).\n- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).\n- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).\n- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).\n- usb: musb: fix enumeration after resume (bnc#1012382).\n- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).\n- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).\n- vfs: add path_has_submounts() (bsc#1086716).\n- vfs: add path_is_mountpoint() helper (bsc#1086716).\n- vfs: change d_manage() to take a struct path (bsc#1086716).\n- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).\n- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).\n- vmscan: do not force-scan file lru if its absolute size is small (bnc#1012382).\n- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).\n- vti4: Do not count header length twice on tunnel setup (bnc#1012382).\n- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).\n- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).\n- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).\n- workqueue: use put_device() instead of kfree() (bnc#1012382).\n- x86/apic: Set up through-local-APIC mode on the boot CPU if \u0027noapic\u0027 specified (bnc#1012382).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).\n- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).\n- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).\n- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).\n- x86/devicetree: Initialize device tree before using it (bnc#1012382).\n- x86: ENABLE_IBRS is sometimes called early during boot while it should not. Let\u0027s drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012\n- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).\n- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).\n- x86/fpu: Revert (\u0027x86/fpu: Disable AVX when eagerfpu is off\u0027) (bnc#1012382).\n- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).\n- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).\n- x86/pkeys: Do not special case protection key 0 (1041740).\n- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).\n- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).\n- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).\n- x86/topology: Update the \u0027cpu cores\u0027 field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).\n- xen/acpi: off by one in read_acpi_id() (bnc#1012382).\n- xen/grant-table: Use put_page instead of free_page (bnc#1012382).\n- xen-netfront: Fix race between device setup and open (bnc#1012382).\n- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).\n- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).\n- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).\n- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).\n- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).\n- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).\n- zorro: Set up z-\u003edev.dma_mask for the DMA API (bnc#1012382).\n- xfs: fix incorrect log_flushed on fsync (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-1199,SUSE-SLE-HA-12-SP3-2018-1199,SUSE-SLE-Live-Patching-12-SP3-2018-1199,SUSE-SLE-SDK-12-SP3-2018-1199,SUSE-SLE-SERVER-12-SP3-2018-1199,SUSE-SLE-WE-12-SP3-2018-1199", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1772-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1772-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181772-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1772-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1024718", "url": "https://bugzilla.suse.com/1024718" }, { "category": "self", "summary": "SUSE Bug 1031717", "url": "https://bugzilla.suse.com/1031717" }, { "category": "self", "summary": "SUSE Bug 1035432", "url": "https://bugzilla.suse.com/1035432" }, { "category": "self", "summary": "SUSE Bug 1041740", "url": "https://bugzilla.suse.com/1041740" }, { "category": "self", "summary": "SUSE Bug 1045330", "url": "https://bugzilla.suse.com/1045330" }, { "category": "self", "summary": "SUSE Bug 1056415", "url": "https://bugzilla.suse.com/1056415" }, { "category": "self", "summary": "SUSE Bug 1066223", "url": "https://bugzilla.suse.com/1066223" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1068054", "url": "https://bugzilla.suse.com/1068054" }, { "category": "self", "summary": "SUSE Bug 1068951", "url": "https://bugzilla.suse.com/1068951" }, { "category": "self", "summary": "SUSE Bug 1070404", "url": "https://bugzilla.suse.com/1070404" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1075428", "url": "https://bugzilla.suse.com/1075428" }, { "category": "self", "summary": "SUSE Bug 1076049", "url": "https://bugzilla.suse.com/1076049" }, { "category": "self", "summary": "SUSE Bug 1078583", "url": "https://bugzilla.suse.com/1078583" }, { "category": "self", "summary": "SUSE Bug 1079152", "url": "https://bugzilla.suse.com/1079152" }, { "category": "self", "summary": "SUSE Bug 1080542", "url": "https://bugzilla.suse.com/1080542" }, { "category": "self", "summary": "SUSE Bug 1080656", "url": "https://bugzilla.suse.com/1080656" }, { "category": "self", "summary": "SUSE Bug 1081500", "url": "https://bugzilla.suse.com/1081500" }, { "category": "self", "summary": "SUSE Bug 1081514", "url": "https://bugzilla.suse.com/1081514" }, { "category": "self", "summary": "SUSE Bug 1082153", "url": "https://bugzilla.suse.com/1082153" }, { "category": "self", "summary": "SUSE Bug 1082504", "url": "https://bugzilla.suse.com/1082504" }, { "category": "self", "summary": "SUSE Bug 1082979", "url": "https://bugzilla.suse.com/1082979" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1086400", "url": "https://bugzilla.suse.com/1086400" }, { "category": "self", "summary": "SUSE Bug 1086716", "url": "https://bugzilla.suse.com/1086716" }, { "category": "self", "summary": "SUSE Bug 1087036", "url": "https://bugzilla.suse.com/1087036" }, { "category": "self", "summary": "SUSE Bug 1087086", "url": "https://bugzilla.suse.com/1087086" }, { "category": "self", "summary": "SUSE Bug 1088871", "url": "https://bugzilla.suse.com/1088871" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1090534", "url": "https://bugzilla.suse.com/1090534" }, { "category": "self", "summary": "SUSE Bug 1090734", "url": "https://bugzilla.suse.com/1090734" }, { "category": "self", "summary": "SUSE Bug 1090955", "url": "https://bugzilla.suse.com/1090955" }, { "category": "self", "summary": "SUSE Bug 1091594", "url": "https://bugzilla.suse.com/1091594" }, { "category": "self", "summary": "SUSE Bug 1094532", "url": "https://bugzilla.suse.com/1094532" }, { "category": "self", "summary": "SUSE Bug 1095042", "url": "https://bugzilla.suse.com/1095042" }, { "category": "self", "summary": "SUSE Bug 1095147", "url": "https://bugzilla.suse.com/1095147" }, { "category": "self", "summary": "SUSE Bug 1096037", "url": "https://bugzilla.suse.com/1096037" }, { "category": "self", "summary": "SUSE Bug 1096140", "url": "https://bugzilla.suse.com/1096140" }, { "category": "self", "summary": "SUSE Bug 1096214", "url": "https://bugzilla.suse.com/1096214" }, { "category": "self", "summary": "SUSE Bug 1096242", "url": "https://bugzilla.suse.com/1096242" }, { "category": "self", "summary": "SUSE Bug 1096281", "url": "https://bugzilla.suse.com/1096281" }, { "category": "self", "summary": "SUSE Bug 1096751", "url": "https://bugzilla.suse.com/1096751" }, { "category": "self", "summary": "SUSE Bug 1096982", "url": "https://bugzilla.suse.com/1096982" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1097356", "url": "https://bugzilla.suse.com/1097356" }, { "category": "self", "summary": "SUSE Bug 1098009", "url": "https://bugzilla.suse.com/1098009" }, { "category": "self", "summary": "SUSE Bug 1098012", "url": "https://bugzilla.suse.com/1098012" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 978907", "url": "https://bugzilla.suse.com/978907" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18241 page", "url": "https://www.suse.com/security/cve/CVE-2017-18241/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18249 page", "url": "https://www.suse.com/security/cve/CVE-2017-18249/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5848 page", "url": "https://www.suse.com/security/cve/CVE-2018-5848/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-06-21T11:53:03Z", "generator": { "date": "2018-06-21T11:53:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1772-1", "initial_release_date": "2018-06-21T11:53:03Z", "revision_history": [ { "date": "2018-06-21T11:53:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-obs-build-4.4.138-94.39.1.aarch64", "product": { "name": "kernel-obs-build-4.4.138-94.39.1.aarch64", "product_id": "kernel-obs-build-4.4.138-94.39.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.138-94.39.1.aarch64", "product": { "name": "kernel-default-4.4.138-94.39.1.aarch64", "product_id": "kernel-default-4.4.138-94.39.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.138-94.39.1.aarch64", "product": { "name": "kernel-default-base-4.4.138-94.39.1.aarch64", "product_id": "kernel-default-base-4.4.138-94.39.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.138-94.39.1.aarch64", "product": { "name": "kernel-default-devel-4.4.138-94.39.1.aarch64", "product_id": "kernel-default-devel-4.4.138-94.39.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.138-94.39.1.aarch64", "product": { "name": "kernel-syms-4.4.138-94.39.1.aarch64", "product_id": "kernel-syms-4.4.138-94.39.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.138-94.39.1.noarch", "product": { "name": "kernel-devel-4.4.138-94.39.1.noarch", "product_id": "kernel-devel-4.4.138-94.39.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.138-94.39.1.noarch", "product": { "name": "kernel-macros-4.4.138-94.39.1.noarch", "product_id": "kernel-macros-4.4.138-94.39.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.138-94.39.1.noarch", "product": { "name": "kernel-source-4.4.138-94.39.1.noarch", "product_id": "kernel-source-4.4.138-94.39.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.138-94.39.1.noarch", "product": { "name": "kernel-docs-4.4.138-94.39.1.noarch", "product_id": "kernel-docs-4.4.138-94.39.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.138-94.39.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.138-94.39.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.138-94.39.1.ppc64le", "product_id": "dlm-kmp-default-4.4.138-94.39.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.138-94.39.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.138-94.39.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "product": { "name": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "product_id": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.138-94.39.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.138-94.39.1.ppc64le", "product_id": "kernel-obs-build-4.4.138-94.39.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.138-94.39.1.ppc64le", "product": { "name": "kernel-default-4.4.138-94.39.1.ppc64le", "product_id": "kernel-default-4.4.138-94.39.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.138-94.39.1.ppc64le", "product": { "name": "kernel-default-base-4.4.138-94.39.1.ppc64le", "product_id": "kernel-default-base-4.4.138-94.39.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.138-94.39.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.138-94.39.1.ppc64le", "product_id": "kernel-default-devel-4.4.138-94.39.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.138-94.39.1.ppc64le", "product": { "name": "kernel-syms-4.4.138-94.39.1.ppc64le", "product_id": "kernel-syms-4.4.138-94.39.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.138-94.39.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.138-94.39.1.s390x", "product_id": "cluster-md-kmp-default-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.138-94.39.1.s390x", "product": { "name": "dlm-kmp-default-4.4.138-94.39.1.s390x", "product_id": "dlm-kmp-default-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.138-94.39.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.138-94.39.1.s390x", "product_id": "gfs2-kmp-default-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.138-94.39.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.138-94.39.1.s390x", "product_id": "ocfs2-kmp-default-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.138-94.39.1.s390x", "product": { "name": "kernel-obs-build-4.4.138-94.39.1.s390x", "product_id": "kernel-obs-build-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.138-94.39.1.s390x", "product": { "name": "kernel-default-4.4.138-94.39.1.s390x", "product_id": "kernel-default-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.138-94.39.1.s390x", "product": { "name": "kernel-default-base-4.4.138-94.39.1.s390x", "product_id": "kernel-default-base-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.138-94.39.1.s390x", "product": { "name": "kernel-default-devel-4.4.138-94.39.1.s390x", "product_id": "kernel-default-devel-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.138-94.39.1.s390x", "product": { "name": "kernel-default-man-4.4.138-94.39.1.s390x", "product_id": "kernel-default-man-4.4.138-94.39.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.138-94.39.1.s390x", "product": { "name": "kernel-syms-4.4.138-94.39.1.s390x", "product_id": "kernel-syms-4.4.138-94.39.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.138-94.39.1.x86_64", "product": { "name": "kernel-default-4.4.138-94.39.1.x86_64", "product_id": "kernel-default-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.138-94.39.1.x86_64", "product": { "name": "kernel-default-devel-4.4.138-94.39.1.x86_64", "product_id": "kernel-default-devel-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.138-94.39.1.x86_64", "product": { "name": "kernel-default-extra-4.4.138-94.39.1.x86_64", "product_id": "kernel-default-extra-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.138-94.39.1.x86_64", "product": { "name": "kernel-syms-4.4.138-94.39.1.x86_64", "product_id": "kernel-syms-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.138-94.39.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.138-94.39.1.x86_64", "product_id": "dlm-kmp-default-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.138-94.39.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.138-94.39.1.x86_64", "product_id": "gfs2-kmp-default-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "product_id": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.138-94.39.1.x86_64", "product": { "name": "kernel-obs-build-4.4.138-94.39.1.x86_64", "product_id": "kernel-obs-build-4.4.138-94.39.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.138-94.39.1.x86_64", "product": { "name": "kernel-default-base-4.4.138-94.39.1.x86_64", "product_id": "kernel-default-base-4.4.138-94.39.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-devel-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-macros-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-source-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-syms-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-docs-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-obs-build-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-obs-build-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-obs-build-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-obs-build-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-default-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-default-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-default-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-default-base-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-default-base-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-base-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-default-man-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-devel-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-macros-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-source-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-syms-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-syms-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-syms-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-syms-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-default-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-default-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-default-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-default-base-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-default-base-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-base-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-default-man-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-devel-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-macros-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.138-94.39.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch" }, "product_reference": "kernel-source-4.4.138-94.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64" }, "product_reference": "kernel-syms-4.4.138-94.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le" }, "product_reference": "kernel-syms-4.4.138-94.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x" }, "product_reference": "kernel-syms-4.4.138-94.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-syms-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.138-94.39.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.138-94.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-21T11:53:03Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-18241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18241" } ], "notes": [ { "category": "general", "text": "fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18241", "url": "https://www.suse.com/security/cve/CVE-2017-18241" }, { "category": "external", "summary": "SUSE Bug 1086400 for CVE-2017-18241", "url": "https://bugzilla.suse.com/1086400" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-21T11:53:03Z", "details": "moderate" } ], "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18249" } ], "notes": [ { "category": "general", "text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18249", "url": "https://www.suse.com/security/cve/CVE-2017-18249" }, { "category": "external", "summary": "SUSE Bug 1087036 for CVE-2017-18249", "url": "https://bugzilla.suse.com/1087036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-21T11:53:03Z", "details": "moderate" } ], "title": "CVE-2017-18249" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-21T11:53:03Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-21T11:53:03Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5848" } ], "notes": [ { "category": "general", "text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5848", "url": "https://www.suse.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097356 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1097356" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1115339 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1115339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.138-94.39.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.138-94.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.138-94.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-21T11:53:03Z", "details": "moderate" } ], "title": "CVE-2018-5848" } ] }
suse-su-2018:0437-1
Vulnerability from csaf_suse
Published
2018-02-13 14:24
Modified
2018-02-13 14:24
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized disclosure
of information to an attacker with local user access via a side-channel
analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building
the Linux Kernel with return trampolines aka 'retpolines'.
- CVE-2017-18079: drivers/input/serio/i8042.c allowed attackers to cause a
denial of service (NULL pointer dereference and system crash) or possibly have
unspecified other impact because the port->exists value can change after it is
validated (bnc#1077922)
- CVE-2015-1142857: Prevent guests from sending ethernet flow control pause
frames via the PF (bnc#1077355)
- CVE-2017-17741: KVM allowed attackers to obtain potentially sensitive
information from kernel memory, aka a write_mmio stack-based out-of-bounds read
(bnc#1073311)
- CVE-2017-13215: Prevent elevation of privilege (bnc#1075908)
- CVE-2018-1000004: Prevent race condition in the sound system, this could have
lead a deadlock and denial of service condition (bnc#1076017)
- CVE-2017-17806: The HMAC implementation did not validate that the underlying
cryptographic hash algorithm is unkeyed, allowing a local attacker able to use
the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3
hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by
executing a crafted sequence of system calls that encounter a missing SHA-3
initialization (bnc#1073874)
- CVE-2017-17805: The Salsa20 encryption algorithm did not correctly handle
zero-length inputs, allowing a local attacker able to use the AF_ALG-based
skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of
service (uninitialized-memory free and kernel crash) or have unspecified other
impact by executing a crafted sequence of system calls that use the
blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c)
and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were
vulnerable (bnc#1073792)
The following non-security bugs were fixed:
- bcache allocator: send discards with correct size (bsc#1047626).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: Abstract out stuff needed for sorting (bsc#1076110).
- bcache: Add a cond_resched() call to gc (bsc#1076110).
- bcache: Add a real GC_MARK_RECLAIMABLE (bsc#1076110).
- bcache: Add bch_bkey_equal_header() (bsc#1076110).
- bcache: Add bch_btree_keys_u64s_remaining() (bsc#1076110).
- bcache: Add bch_keylist_init_single() (bsc#1047626).
- bcache: Add btree_insert_node() (bnc#951638).
- bcache: Add btree_map() functions (bsc#1047626).
- bcache: Add btree_node_write_sync() (bsc#1076110).
- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).
- bcache: Add make_btree_freeing_key() (bsc#1076110).
- bcache: Add on error panic/unregister setting (bsc#1047626).
- bcache: Add struct bset_sort_state (bsc#1076110).
- bcache: Add struct btree_keys (bsc#1076110).
- bcache: Allocate bounce buffers with GFP_NOWAIT (bsc#1076110).
- bcache: Avoid deadlocking in garbage collection (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: Better alloc tracepoints (bsc#1076110).
- bcache: Better full stripe scanning (bsc#1076110).
- bcache: Bkey indexing renaming (bsc#1076110).
- bcache: Break up struct search (bsc#1076110).
- bcache: Btree verify code improvements (bsc#1076110).
- bcache: Bypass torture test (bsc#1076110).
- bcache: Change refill_dirty() to always scan entire disk if necessary (bsc#1076110).
- bcache: Clean up cache_lookup_fn (bsc#1076110).
- bcache: Clean up keylist code (bnc#951638).
- bcache: Convert bch_btree_insert() to bch_btree_map_leaf_nodes() (bsc#1076110).
- bcache: Convert bch_btree_read_async() to bch_btree_map_keys() (bsc#1076110).
- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).
- bcache: Convert btree_iter to struct btree_keys (bsc#1076110).
- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert debug code to btree_keys (bsc#1076110).
- bcache: Convert gc to a kthread (bsc#1047626).
- bcache: Convert sorting to btree_keys (bsc#1076110).
- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).
- bcache: Convert writeback to a kthread (bsc#1076110).
- bcache: Correct return value for sysfs attach errors (bsc#1076110).
- bcache: Debug code improvements (bsc#1076110).
- bcache: Delete some slower inline asm (bsc#1047626).
- bcache: Do bkey_put() in btree_split() error path (bsc#1076110).
- bcache: Do not bother with bucket refcount for btree node allocations (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).
- bcache: Do not return -EINTR when insert finished (bsc#1076110).
- bcache: Do not touch bucket gen for dirty ptrs (bsc#1076110).
- bcache: Do not use op->insert_collision (bsc#1076110).
- bcache: Drop some closure stuff (bsc#1076110).
- bcache: Drop unneeded blk_sync_queue() calls (bsc#1047626).
- bcache: Explicitly track btree node's parent (bnc#951638).
- bcache: Fix a bug recovering from unclean shutdown (bsc#1047626).
- bcache: Fix a bug when detaching (bsc#951638).
- bcache: Fix a journal replay bug (bsc#1076110).
- bcache: Fix a journalling performance bug (bnc#893777).
- bcache: Fix a journalling reclaim after recovery bug (bsc#1047626).
- bcache: Fix a lockdep splat (bnc#893777).
- bcache: Fix a lockdep splat in an error path (bnc#951638).
- bcache: Fix a null ptr deref in journal replay (bsc#1047626).
- bcache: Fix a race when freeing btree nodes (bsc#1076110).
- bcache: Fix a shutdown bug (bsc#951638).
- bcache: Fix an infinite loop in journal replay (bsc#1047626).
- bcache: Fix another bug recovering from unclean shutdown (bsc#1076110).
- bcache: Fix another compiler warning on m68k (bsc#1076110).
- bcache: Fix auxiliary search trees for key size > cacheline size (bsc#1076110).
- bcache: Fix bch_ptr_bad() (bsc#1047626).
- bcache: Fix building error on MIPS (bsc#1076110).
- bcache: Fix dirty_data accounting (bsc#1076110).
- bcache: Fix discard granularity (bsc#1047626).
- bcache: Fix flash_dev_cache_miss() for real this time (bsc#1076110).
- bcache: Fix for can_attach_cache() (bsc#1047626).
- bcache: Fix heap_peek() macro (bsc#1047626).
- bcache: Fix leak of bdev reference (bsc#1076110).
- bcache: Fix more early shutdown bugs (bsc#951638).
- bcache: Fix moving_gc deadlocking with a foreground write (bsc#1076110).
- bcache: Fix moving_pred() (bsc#1047626).
- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).
- bcache: Fix to remove the rcu_sched stalls (bsc#1047626).
- bcache: Have btree_split() insert into parent directly (bsc#1076110).
- bcache: Improve bucket_prio() calculation (bsc#1047626).
- bcache: Improve priority_stats (bsc#1047626).
- bcache: Incremental gc (bsc#1076110).
- bcache: Insert multiple keys at a time (bnc#951638).
- bcache: Kill bch_next_recurse_key() (bsc#1076110).
- bcache: Kill btree_io_wq (bsc#1076110).
- bcache: Kill bucket->gc_gen (bsc#1076110).
- bcache: Kill dead cgroup code (bsc#1076110).
- bcache: Kill op->cl (bsc#1076110).
- bcache: Kill op->replace (bsc#1076110).
- bcache: Kill sequential_merge option (bsc#1076110).
- bcache: Kill unaligned bvec hack (bsc#1076110).
- bcache: Kill unused freelist (bsc#1076110).
- bcache: Make bch_keylist_realloc() take u64s, not nptrs (bsc#1076110).
- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1076110).
- bcache: Minor btree cache fix (bsc#1047626).
- bcache: Minor fixes from kbuild robot (bsc#1076110).
- bcache: Move insert_fixup() to btree_keys_ops (bsc#1076110).
- bcache: Move keylist out of btree_op (bsc#1047626).
- bcache: Move sector allocator to alloc.c (bsc#1076110).
- bcache: Move some stuff to btree.c (bsc#1076110).
- bcache: Move spinlock into struct time_stats (bsc#1076110).
- bcache: New writeback PD controller (bsc#1047626).
- bcache: PRECEDING_KEY() (bsc#1047626).
- bcache: Performance fix for when journal entry is full (bsc#1047626).
- bcache: Prune struct btree_op (bsc#1076110).
- bcache: Pull on disk data structures out into a separate header (bsc#1076110).
- bcache: RESERVE_PRIO is too small by one when prio_buckets() is a power of two (bsc#1076110).
- bcache: Really show state of work pending bit (bsc#1076110).
- bcache: Refactor bset_tree sysfs stats (bsc#1076110).
- bcache: Refactor journalling flow control (bnc#951638).
- bcache: Refactor read request code a bit (bsc#1076110).
- bcache: Refactor request_write() (bnc#951638).
- bcache: Remove deprecated create_workqueue (bsc#1076110).
- bcache: Remove redundant block_size assignment (bsc#1047626).
- bcache: Remove redundant parameter for cache_alloc() (bsc#1047626).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: Remove unnecessary check in should_split() (bsc#1076110).
- bcache: Remove/fix some header dependencies (bsc#1047626).
- bcache: Rename/shuffle various code around (bsc#1076110).
- bcache: Rework allocator reserves (bsc#1076110).
- bcache: Rework btree cache reserve handling (bsc#1076110).
- bcache: Split out sort_extent_cmp() (bsc#1076110).
- bcache: Stripe size isn't necessarily a power of two (bnc#893949).
- bcache: Trivial error handling fix (bsc#1047626).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: Use a mempool for mergesort temporary space (bsc#1076110).
- bcache: Use blkdev_issue_discard() (bnc#951638).
- bcache: Use ida for bcache block dev minor (bsc#1047626).
- bcache: Use uninterruptible sleep in writeback (bsc#1076110).
- bcache: Zero less memory (bsc#1076110).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: add mutex lock for bch_is_open (bnc#902893).
- bcache: allows use of register in udev to avoid 'device_busy' error (bsc#1047626).
- bcache: bcache_write tracepoint was crashing (bsc#1076110).
- bcache: bch_(btree|extent)_ptr_invalid() (bsc#1076110).
- bcache: bch_allocator_thread() is not freezable (bsc#1047626).
- bcache: bch_gc_thread() is not freezable (bsc#1047626).
- bcache: bch_writeback_thread() is not freezable (bsc#1076110).
- bcache: btree locking rework (bsc#1076110).
- bcache: bugfix - gc thread now gets woken when cache is full (bsc#1047626).
- bcache: bugfix - moving_gc now moves only correct buckets (bsc#1047626).
- bcache: bugfix for race between moving_gc and bucket_invalidate (bsc#1076110).
- bcache: check ca->alloc_thread initialized before wake up it (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: cleaned up error handling around register_cache() (bsc#1047626).
- bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing device (bsc#1047626).
- bcache: correct cache_dirty_target in __update_writeback_rate() (bsc#1076110).
- bcache: defensively handle format strings (bsc#1047626).
- bcache: do not embed 'return' statements in closure macros (bsc#1076110).
- bcache: do not subtract sectors_to_gc for bypassed IO (bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bsc#1076110).
- bcache: fix BUG_ON due to integer overflow with GC_SECTORS_USED (bsc#1047626).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: fix a livelock when we cause a huge number of cache misses (bsc#1047626).
- bcache: fix bch_hprint crash and improve output (bsc#1076110).
- bcache: fix crash in bcache_btree_node_alloc_fail tracepoint (bsc#1047626).
- bcache: fix crash on shutdown in passthrough mode (bsc#1076110).
- bcache: fix for gc and write-back race (bsc#1076110).
- bcache: fix for gc and writeback race (bsc#1047626).
- bcache: fix for gc crashing when no sectors are used (bsc#1047626).
- bcache: fix lockdep warnings on shutdown (bsc#1047626).
- bcache: fix race of writeback thread starting before complete initialization (bsc#1076110).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix sparse non static symbol warning (bsc#1076110).
- bcache: fix typo in bch_bkey_equal_header (bsc#1076110).
- bcache: fix uninterruptible sleep in writeback thread (bsc#1076110).
- bcache: fix use-after-free in btree_gc_coalesce() (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bsc#1076110).
- bcache: gc does not work when triggering by manual command (bsc#1076110).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: initialize dirty stripes in flash_dev_run() (bsc#1076110).
- bcache: kill closure locking code (bsc#1076110).
- bcache: kill closure locking usage (bnc#951638).
- bcache: kill index() (bsc#1047626).
- bcache: kthread do not set writeback task to INTERUPTIBLE (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean (bsc#1076110).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).
- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).
- bcache: prevent crash on changing writeback_running (bsc#1076110).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bsc#1076110).
- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1047626).
- bcache: remove nested function usage (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache: stop moving_gc marking buckets that can't be moved (bsc#1047626).
- bcache: try to set b->parent properly (bsc#1076110).
- bcache: update bch_bkey_try_merge (bsc#1076110).
- bcache: update bio->bi_opf bypass/writeback REQ_ flag hints (bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: update document info (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use kvfree() in various places (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).
- bcache: wait for buckets when allocating new btree root (bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- fork: clear thread stack upon allocation (bsc#1077560).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076154).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).
- md: more open-coded offset_in_page() (bsc#1076110).
- nfsd: do not share group_info among threads (bsc@1070623).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-301,SUSE-SLE-SERVER-12-2018-301
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis (bnc#1068032).\n\n The previous fix using CPU Microcode has been complemented by building\n the Linux Kernel with return trampolines aka \u0027retpolines\u0027.\n\n- CVE-2017-18079: drivers/input/serio/i8042.c allowed attackers to cause a\n denial of service (NULL pointer dereference and system crash) or possibly have\n unspecified other impact because the port-\u003eexists value can change after it is\n validated (bnc#1077922)\n- CVE-2015-1142857: Prevent guests from sending ethernet flow control pause\n frames via the PF (bnc#1077355)\n- CVE-2017-17741: KVM allowed attackers to obtain potentially sensitive\n information from kernel memory, aka a write_mmio stack-based out-of-bounds read\n (bnc#1073311)\n- CVE-2017-13215: Prevent elevation of privilege (bnc#1075908)\n- CVE-2018-1000004: Prevent race condition in the sound system, this could have\n lead a deadlock and denial of service condition (bnc#1076017)\n- CVE-2017-17806: The HMAC implementation did not validate that the underlying\n cryptographic hash algorithm is unkeyed, allowing a local attacker able to use\n the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3\n hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by\n executing a crafted sequence of system calls that encounter a missing SHA-3\n initialization (bnc#1073874)\n- CVE-2017-17805: The Salsa20 encryption algorithm did not correctly handle\n zero-length inputs, allowing a local attacker able to use the AF_ALG-based\n skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of\n service (uninitialized-memory free and kernel crash) or have unspecified other\n impact by executing a crafted sequence of system calls that use the\n blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c)\n and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were\n vulnerable (bnc#1073792)\n\nThe following non-security bugs were fixed:\n\n- bcache allocator: send discards with correct size (bsc#1047626).\n- bcache.txt: standardize document format (bsc#1076110).\n- bcache: Abstract out stuff needed for sorting (bsc#1076110).\n- bcache: Add a cond_resched() call to gc (bsc#1076110).\n- bcache: Add a real GC_MARK_RECLAIMABLE (bsc#1076110).\n- bcache: Add bch_bkey_equal_header() (bsc#1076110).\n- bcache: Add bch_btree_keys_u64s_remaining() (bsc#1076110).\n- bcache: Add bch_keylist_init_single() (bsc#1047626).\n- bcache: Add btree_insert_node() (bnc#951638).\n- bcache: Add btree_map() functions (bsc#1047626).\n- bcache: Add btree_node_write_sync() (bsc#1076110).\n- bcache: Add explicit keylist arg to btree_insert() (bnc#951638).\n- bcache: Add make_btree_freeing_key() (bsc#1076110).\n- bcache: Add on error panic/unregister setting (bsc#1047626).\n- bcache: Add struct bset_sort_state (bsc#1076110).\n- bcache: Add struct btree_keys (bsc#1076110).\n- bcache: Allocate bounce buffers with GFP_NOWAIT (bsc#1076110).\n- bcache: Avoid deadlocking in garbage collection (bsc#1076110).\n- bcache: Avoid nested function definition (bsc#1076110).\n- bcache: Better alloc tracepoints (bsc#1076110).\n- bcache: Better full stripe scanning (bsc#1076110).\n- bcache: Bkey indexing renaming (bsc#1076110).\n- bcache: Break up struct search (bsc#1076110).\n- bcache: Btree verify code improvements (bsc#1076110).\n- bcache: Bypass torture test (bsc#1076110).\n- bcache: Change refill_dirty() to always scan entire disk if necessary (bsc#1076110).\n- bcache: Clean up cache_lookup_fn (bsc#1076110).\n- bcache: Clean up keylist code (bnc#951638).\n- bcache: Convert bch_btree_insert() to bch_btree_map_leaf_nodes() (bsc#1076110).\n- bcache: Convert bch_btree_read_async() to bch_btree_map_keys() (bsc#1076110).\n- bcache: Convert btree_insert_check_key() to btree_insert_node() (bnc#951638).\n- bcache: Convert btree_iter to struct btree_keys (bsc#1076110).\n- bcache: Convert bucket_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert debug code to btree_keys (bsc#1076110).\n- bcache: Convert gc to a kthread (bsc#1047626).\n- bcache: Convert sorting to btree_keys (bsc#1076110).\n- bcache: Convert try_wait to wait_queue_head_t (bnc#951638).\n- bcache: Convert writeback to a kthread (bsc#1076110).\n- bcache: Correct return value for sysfs attach errors (bsc#1076110).\n- bcache: Debug code improvements (bsc#1076110).\n- bcache: Delete some slower inline asm (bsc#1047626).\n- bcache: Do bkey_put() in btree_split() error path (bsc#1076110).\n- bcache: Do not bother with bucket refcount for btree node allocations (bsc#1076110).\n- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).\n- bcache: Do not return -EINTR when insert finished (bsc#1076110).\n- bcache: Do not touch bucket gen for dirty ptrs (bsc#1076110).\n- bcache: Do not use op-\u003einsert_collision (bsc#1076110).\n- bcache: Drop some closure stuff (bsc#1076110).\n- bcache: Drop unneeded blk_sync_queue() calls (bsc#1047626).\n- bcache: Explicitly track btree node\u0027s parent (bnc#951638).\n- bcache: Fix a bug recovering from unclean shutdown (bsc#1047626).\n- bcache: Fix a bug when detaching (bsc#951638).\n- bcache: Fix a journal replay bug (bsc#1076110).\n- bcache: Fix a journalling performance bug (bnc#893777).\n- bcache: Fix a journalling reclaim after recovery bug (bsc#1047626).\n- bcache: Fix a lockdep splat (bnc#893777).\n- bcache: Fix a lockdep splat in an error path (bnc#951638).\n- bcache: Fix a null ptr deref in journal replay (bsc#1047626).\n- bcache: Fix a race when freeing btree nodes (bsc#1076110).\n- bcache: Fix a shutdown bug (bsc#951638).\n- bcache: Fix an infinite loop in journal replay (bsc#1047626).\n- bcache: Fix another bug recovering from unclean shutdown (bsc#1076110).\n- bcache: Fix another compiler warning on m68k (bsc#1076110).\n- bcache: Fix auxiliary search trees for key size \u003e cacheline size (bsc#1076110).\n- bcache: Fix bch_ptr_bad() (bsc#1047626).\n- bcache: Fix building error on MIPS (bsc#1076110).\n- bcache: Fix dirty_data accounting (bsc#1076110).\n- bcache: Fix discard granularity (bsc#1047626).\n- bcache: Fix flash_dev_cache_miss() for real this time (bsc#1076110).\n- bcache: Fix for can_attach_cache() (bsc#1047626).\n- bcache: Fix heap_peek() macro (bsc#1047626).\n- bcache: Fix leak of bdev reference (bsc#1076110).\n- bcache: Fix more early shutdown bugs (bsc#951638).\n- bcache: Fix moving_gc deadlocking with a foreground write (bsc#1076110).\n- bcache: Fix moving_pred() (bsc#1047626).\n- bcache: Fix sysfs splat on shutdown with flash only devs (bsc#951638).\n- bcache: Fix to remove the rcu_sched stalls (bsc#1047626).\n- bcache: Have btree_split() insert into parent directly (bsc#1076110).\n- bcache: Improve bucket_prio() calculation (bsc#1047626).\n- bcache: Improve priority_stats (bsc#1047626).\n- bcache: Incremental gc (bsc#1076110).\n- bcache: Insert multiple keys at a time (bnc#951638).\n- bcache: Kill bch_next_recurse_key() (bsc#1076110).\n- bcache: Kill btree_io_wq (bsc#1076110).\n- bcache: Kill bucket-\u003egc_gen (bsc#1076110).\n- bcache: Kill dead cgroup code (bsc#1076110).\n- bcache: Kill op-\u003ecl (bsc#1076110).\n- bcache: Kill op-\u003ereplace (bsc#1076110).\n- bcache: Kill sequential_merge option (bsc#1076110).\n- bcache: Kill unaligned bvec hack (bsc#1076110).\n- bcache: Kill unused freelist (bsc#1076110).\n- bcache: Make bch_keylist_realloc() take u64s, not nptrs (bsc#1076110).\n- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1076110).\n- bcache: Minor btree cache fix (bsc#1047626).\n- bcache: Minor fixes from kbuild robot (bsc#1076110).\n- bcache: Move insert_fixup() to btree_keys_ops (bsc#1076110).\n- bcache: Move keylist out of btree_op (bsc#1047626).\n- bcache: Move sector allocator to alloc.c (bsc#1076110).\n- bcache: Move some stuff to btree.c (bsc#1076110).\n- bcache: Move spinlock into struct time_stats (bsc#1076110).\n- bcache: New writeback PD controller (bsc#1047626).\n- bcache: PRECEDING_KEY() (bsc#1047626).\n- bcache: Performance fix for when journal entry is full (bsc#1047626).\n- bcache: Prune struct btree_op (bsc#1076110).\n- bcache: Pull on disk data structures out into a separate header (bsc#1076110).\n- bcache: RESERVE_PRIO is too small by one when prio_buckets() is a power of two (bsc#1076110).\n- bcache: Really show state of work pending bit (bsc#1076110).\n- bcache: Refactor bset_tree sysfs stats (bsc#1076110).\n- bcache: Refactor journalling flow control (bnc#951638).\n- bcache: Refactor read request code a bit (bsc#1076110).\n- bcache: Refactor request_write() (bnc#951638).\n- bcache: Remove deprecated create_workqueue (bsc#1076110).\n- bcache: Remove redundant block_size assignment (bsc#1047626).\n- bcache: Remove redundant parameter for cache_alloc() (bsc#1047626).\n- bcache: Remove redundant set_capacity (bsc#1076110).\n- bcache: Remove unnecessary check in should_split() (bsc#1076110).\n- bcache: Remove/fix some header dependencies (bsc#1047626).\n- bcache: Rename/shuffle various code around (bsc#1076110).\n- bcache: Rework allocator reserves (bsc#1076110).\n- bcache: Rework btree cache reserve handling (bsc#1076110).\n- bcache: Split out sort_extent_cmp() (bsc#1076110).\n- bcache: Stripe size isn\u0027t necessarily a power of two (bnc#893949).\n- bcache: Trivial error handling fix (bsc#1047626).\n- bcache: Update continue_at() documentation (bsc#1076110).\n- bcache: Use a mempool for mergesort temporary space (bsc#1076110).\n- bcache: Use blkdev_issue_discard() (bnc#951638).\n- bcache: Use ida for bcache block dev minor (bsc#1047626).\n- bcache: Use uninterruptible sleep in writeback (bsc#1076110).\n- bcache: Zero less memory (bsc#1076110).\n- bcache: add a comment in journal bucket reading (bsc#1076110).\n- bcache: add mutex lock for bch_is_open (bnc#902893).\n- bcache: allows use of register in udev to avoid \u0027device_busy\u0027 error (bsc#1047626).\n- bcache: bcache_write tracepoint was crashing (bsc#1076110).\n- bcache: bch_(btree|extent)_ptr_invalid() (bsc#1076110).\n- bcache: bch_allocator_thread() is not freezable (bsc#1047626).\n- bcache: bch_gc_thread() is not freezable (bsc#1047626).\n- bcache: bch_writeback_thread() is not freezable (bsc#1076110).\n- bcache: btree locking rework (bsc#1076110).\n- bcache: bugfix - gc thread now gets woken when cache is full (bsc#1047626).\n- bcache: bugfix - moving_gc now moves only correct buckets (bsc#1047626).\n- bcache: bugfix for race between moving_gc and bucket_invalidate (bsc#1076110).\n- bcache: check ca-\u003ealloc_thread initialized before wake up it (bsc#1076110).\n- bcache: check return value of register_shrinker (bsc#1076110).\n- bcache: cleaned up error handling around register_cache() (bsc#1047626).\n- bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing device (bsc#1047626).\n- bcache: correct cache_dirty_target in __update_writeback_rate() (bsc#1076110).\n- bcache: defensively handle format strings (bsc#1047626).\n- bcache: do not embed \u0027return\u0027 statements in closure macros (bsc#1076110).\n- bcache: do not subtract sectors_to_gc for bypassed IO (bsc#1076110).\n- bcache: do not write back data if reading it failed (bsc#1076110).\n- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).\n- bcache: documentation updates and corrections (bsc#1076110).\n- bcache: explicitly destroy mutex while exiting (bsc#1076110).\n- bcache: fix BUG_ON due to integer overflow with GC_SECTORS_USED (bsc#1047626).\n- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).\n- bcache: fix a livelock when we cause a huge number of cache misses (bsc#1047626).\n- bcache: fix bch_hprint crash and improve output (bsc#1076110).\n- bcache: fix crash in bcache_btree_node_alloc_fail tracepoint (bsc#1047626).\n- bcache: fix crash on shutdown in passthrough mode (bsc#1076110).\n- bcache: fix for gc and write-back race (bsc#1076110).\n- bcache: fix for gc and writeback race (bsc#1047626).\n- bcache: fix for gc crashing when no sectors are used (bsc#1047626).\n- bcache: fix lockdep warnings on shutdown (bsc#1047626).\n- bcache: fix race of writeback thread starting before complete initialization (bsc#1076110).\n- bcache: fix sequential large write IO bypass (bsc#1076110).\n- bcache: fix sparse non static symbol warning (bsc#1076110).\n- bcache: fix typo in bch_bkey_equal_header (bsc#1076110).\n- bcache: fix uninterruptible sleep in writeback thread (bsc#1076110).\n- bcache: fix use-after-free in btree_gc_coalesce() (bsc#1076110).\n- bcache: fix wrong cache_misses statistics (bsc#1076110).\n- bcache: gc does not work when triggering by manual command (bsc#1076110).\n- bcache: implement PI controller for writeback rate (bsc#1076110).\n- bcache: increase the number of open buckets (bsc#1076110).\n- bcache: initialize dirty stripes in flash_dev_run() (bsc#1076110).\n- bcache: kill closure locking code (bsc#1076110).\n- bcache: kill closure locking usage (bnc#951638).\n- bcache: kill index() (bsc#1047626).\n- bcache: kthread do not set writeback task to INTERUPTIBLE (bsc#1076110).\n- bcache: only permit to recovery read error when cache device is clean (bsc#1076110).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).\n- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).\n- bcache: prevent crash on changing writeback_running (bsc#1076110).\n- bcache: rearrange writeback main thread ratelimit (bsc#1076110).\n- bcache: recover data from backing when data is clean (bsc#1076110).\n- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1047626).\n- bcache: remove nested function usage (bsc#1076110).\n- bcache: remove unused parameter (bsc#1076110).\n- bcache: rewrite multiple partitions support (bsc#1076110).\n- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).\n- bcache: silence static checker warning (bsc#1076110).\n- bcache: smooth writeback rate control (bsc#1076110).\n- bcache: stop moving_gc marking buckets that can\u0027t be moved (bsc#1047626).\n- bcache: try to set b-\u003eparent properly (bsc#1076110).\n- bcache: update bch_bkey_try_merge (bsc#1076110).\n- bcache: update bio-\u003ebi_opf bypass/writeback REQ_ flag hints (bsc#1076110).\n- bcache: update bucket_in_use in real time (bsc#1076110).\n- bcache: update document info (bsc#1076110).\n- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).\n- bcache: use kvfree() in various places (bsc#1076110).\n- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).\n- bcache: wait for buckets when allocating new btree root (bsc#1076110).\n- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).\n- bcache: writeback rate shouldn\u0027t artifically clamp (bsc#1076110).\n- fork: clear thread stack upon allocation (bsc#1077560). \n- gcov: disable for COMPILE_TEST (bnc#1012382).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076154).\n- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).\n- md: more open-coded offset_in_page() (bsc#1076110).\n- nfsd: do not share group_info among threads (bsc@1070623).\n- sysfs/cpu: Add vulnerability folder (bnc#1012382).\n- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).\n- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).\n- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).\n- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-301,SUSE-SLE-SERVER-12-2018-301", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0437-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0437-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180437-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0437-1", "url": "https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1047626", "url": "https://bugzilla.suse.com/1047626" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1070623", "url": "https://bugzilla.suse.com/1070623" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1073792", "url": "https://bugzilla.suse.com/1073792" }, { "category": "self", "summary": "SUSE Bug 1073874", "url": "https://bugzilla.suse.com/1073874" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075908", "url": "https://bugzilla.suse.com/1075908" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1076154", "url": "https://bugzilla.suse.com/1076154" }, { "category": "self", "summary": "SUSE Bug 1076278", "url": "https://bugzilla.suse.com/1076278" }, { "category": "self", "summary": "SUSE Bug 1077355", "url": "https://bugzilla.suse.com/1077355" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1077922", "url": "https://bugzilla.suse.com/1077922" }, { "category": "self", "summary": "SUSE Bug 893777", "url": "https://bugzilla.suse.com/893777" }, { "category": "self", "summary": "SUSE Bug 893949", "url": "https://bugzilla.suse.com/893949" }, { "category": "self", "summary": "SUSE Bug 902893", "url": "https://bugzilla.suse.com/902893" }, { "category": "self", "summary": "SUSE Bug 951638", "url": "https://bugzilla.suse.com/951638" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1142857 page", "url": "https://www.suse.com/security/cve/CVE-2015-1142857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13215 page", "url": "https://www.suse.com/security/cve/CVE-2017-13215/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17805 page", "url": "https://www.suse.com/security/cve/CVE-2017-17805/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17806 page", "url": "https://www.suse.com/security/cve/CVE-2017-17806/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18079 page", "url": "https://www.suse.com/security/cve/CVE-2017-18079/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-02-13T14:24:07Z", "generator": { "date": "2018-02-13T14:24:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0437-1", "initial_release_date": "2018-02-13T14:24:07Z", "revision_history": [ { "date": "2018-02-13T14:24:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.119.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.119.1.noarch", "product_id": "kernel-devel-3.12.61-52.119.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.119.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.119.1.noarch", "product_id": "kernel-macros-3.12.61-52.119.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.119.1.noarch", "product": { "name": "kernel-source-3.12.61-52.119.1.noarch", "product_id": "kernel-source-3.12.61-52.119.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.119.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.119.1.ppc64le", "product_id": "kernel-default-3.12.61-52.119.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.119.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.119.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.119.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.119.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.119.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.119.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.119.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.119.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.119.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.119.1.s390x", "product": { "name": "kernel-default-3.12.61-52.119.1.s390x", "product_id": "kernel-default-3.12.61-52.119.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.119.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.119.1.s390x", "product_id": "kernel-default-base-3.12.61-52.119.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.119.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.119.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.119.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.119.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.119.1.s390x", "product_id": "kernel-default-man-3.12.61-52.119.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.119.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.119.1.s390x", "product_id": "kernel-syms-3.12.61-52.119.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.119.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.119.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.119.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.119.1.x86_64", "product_id": "kernel-default-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.119.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.119.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.119.1.x86_64", "product_id": "kernel-syms-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.119.1.x86_64", "product_id": "kernel-xen-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.119.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.119.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.119.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.119.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.119.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.119.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.119.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.119.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.119.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.119.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.119.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.119.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.119.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.119.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.119.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.119.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.119.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.119.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.119.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.119.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.119.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.119.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.119.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.119.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.119.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.119.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1142857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1142857" } ], "notes": [ { "category": "general", "text": "On multiple SR-IOV cars it is possible for VF\u0027s assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1142857", "url": "https://www.suse.com/security/cve/CVE-2015-1142857" }, { "category": "external", "summary": "SUSE Bug 1077355 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1077355" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2015-1142857", "url": "https://bugzilla.suse.com/1105108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-13T14:24:07Z", "details": "moderate" } ], "title": "CVE-2015-1142857" }, { "cve": "CVE-2017-13215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13215" } ], "notes": [ { "category": "general", "text": "A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13215", "url": "https://www.suse.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "SUSE Bug 1075908 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1075908" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13215", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-13T14:24:07Z", "details": "moderate" } ], "title": "CVE-2017-13215" }, { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-13T14:24:07Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-17805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17805" } ], "notes": [ { "category": "general", "text": "The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17805", "url": "https://www.suse.com/security/cve/CVE-2017-17805" }, { "category": "external", "summary": "SUSE Bug 1073792 for CVE-2017-17805", "url": "https://bugzilla.suse.com/1073792" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-17805", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17805", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-13T14:24:07Z", "details": "important" } ], "title": "CVE-2017-17805" }, { "cve": "CVE-2017-17806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17806" } ], "notes": [ { "category": "general", "text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17806", "url": "https://www.suse.com/security/cve/CVE-2017-17806" }, { "category": "external", "summary": "SUSE Bug 1073874 for CVE-2017-17806", "url": "https://bugzilla.suse.com/1073874" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-17806", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17806", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-13T14:24:07Z", "details": "low" } ], "title": "CVE-2017-17806" }, { "cve": "CVE-2017-18079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18079" } ], "notes": [ { "category": "general", "text": "drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-\u003eexists value can change after it is validated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18079", "url": "https://www.suse.com/security/cve/CVE-2017-18079" }, { "category": "external", "summary": "SUSE Bug 1077922 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1077922" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18079", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-13T14:24:07Z", "details": "low" } ], "title": "CVE-2017-18079" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-13T14:24:07Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.119.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.119.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-1-1.7.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-1-1.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-02-13T14:24:07Z", "details": "moderate" } ], "title": "CVE-2018-1000004" } ] }
gsd-2017-17741
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-17741", "description": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "id": "GSD-2017-17741", "references": [ "https://www.suse.com/security/cve/CVE-2017-17741.html", "https://www.debian.org/security/2018/dsa-4082", "https://www.debian.org/security/2017/dsa-4073", "https://ubuntu.com/security/CVE-2017-17741", "https://advisories.mageia.org/CVE-2017-17741.html", "https://security.archlinux.org/CVE-2017-17741", "https://alas.aws.amazon.com/cve/html/CVE-2017-17741.html", "https://linux.oracle.com/cve/CVE-2017-17741.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-17741" ], "details": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "id": "GSD-2017-17741", "modified": "2023-12-13T01:21:04.935609Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3617-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "DSA-4082", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "102227", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102227" }, { "name": "USN-3620-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3620-2/" }, { "name": "https://www.spinics.net/lists/kvm/msg160796.html", "refsource": "MISC", "url": "https://www.spinics.net/lists/kvm/msg160796.html" }, { "name": "DSA-4073", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4073" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "USN-3620-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3620-1/" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-1/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.14.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17741" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.spinics.net/lists/kvm/msg160796.html", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://www.spinics.net/lists/kvm/msg160796.html" }, { "name": "DSA-4073", "refsource": "DEBIAN", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4073" }, { "name": "DSA-4082", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2018/dsa-4082" }, { "name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "name": "102227", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/102227" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "USN-3617-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3620-2", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3620-2/" }, { "name": "USN-3620-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3620-1/" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3632-1/" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0 } }, "lastModifiedDate": "2018-04-25T01:29Z", "publishedDate": "2017-12-18T08:29Z" } } }
ghsa-pr78-g38x-6qfx
Vulnerability from github
Published
2022-05-14 03:29
Modified
2025-04-20 03:50
Severity ?
VLAI Severity ?
Details
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
{ "affected": [], "aliases": [ "CVE-2017-17741" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-12-18T08:29:00Z", "severity": "MODERATE" }, "details": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "id": "GHSA-pr78-g38x-6qfx", "modified": "2025-04-20T03:50:07Z", "published": "2022-05-14T03:29:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17741" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-3" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3619-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3619-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3620-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3620-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3632-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2017/dsa-4073" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "type": "WEB", "url": "https://www.spinics.net/lists/kvm/msg160796.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/102227" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…